// For flags

CVE-2019-10934

 

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in TIA Portal V14 (All versions), TIA Portal V15 (All versions < V15.1 Update 7), TIA Portal V16 (All versions < V16 Update 6), TIA Portal V17 (All versions < V17 Update 4). Changing the contents of a configuration file could allow an attacker to execute arbitrary code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. No user interaction is required. At the time of advisory publication no public exploitation of this security vulnerability was known.

Se ha identificado una vulnerabilidad en TIA Portal V14 (Todas las versiones), TIA Portal V15 (Todas las versiones anteriores a V15.1 Actualización 7), TIA Portal V16 (Todas las versiones anteriores a V16 Actualización 6), TIA Portal V17 (Todas las versiones anteriores a V17 Actualización 4). La modificación del contenido de un archivo de configuración podría permitir a un atacante ejecutar código arbitrario con privilegios de SYSTEM. La vulnerabilidad de seguridad podría ser explotada por un atacante con una cuenta válida y derechos de acceso limitados en el sistema. No se requiere ninguna interacción del usuario. En el momento de la publicación del aviso no se conocía ninguna explotación pública de esta vulnerabilidad de seguridad

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-04-08 CVE Reserved
  • 2020-01-16 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Totally Integrated Automation Portal
Search vendor "Siemens" for product "Totally Integrated Automation Portal"
>= 14 <= 17
Search vendor "Siemens" for product "Totally Integrated Automation Portal" and version " >= 14 <= 17"
-
Affected