// For flags

CVE-2023-46281

 

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 7), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). When accessing the UMC Web-UI from affected products, UMC uses an overly permissive CORS policy. This could allow an attacker to trick a legitimate user to trigger unwanted behavior.

Se ha identificado una vulnerabilidad en:
Opcenter Quality (todas las versiones),
SIMATIC PCS neo (todas las versiones &lt; V4.1),
SINUMERIK Integrate RunMyHMI /Automotive (todas las versiones),
Totally Integrated Automation Portal (TIA Portal) V14 (todas las versiones),
Totally Integrated Automation Portal (TIA Portal) V15.1 (todas las versiones),
Totally Integrated Automation Portal (TIA Portal) V16 (todas las versiones),
Totally Integrated Automation Portal (TIA Portal) V17 (todas las versiones),
Totally Integrated Automation Portal (TIA Portal) ) V18 (Todas las versiones

A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 8), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). When accessing the UMC Web-UI from affected products, UMC uses an overly permissive CORS policy. This could allow an attacker to trick a legitimate user to trigger unwanted behavior.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-10-20 CVE Reserved
  • 2023-12-12 CVE Published
  • 2023-12-15 EPSS Updated
  • 2024-09-10 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-942: Permissive Cross-domain Policy with Untrusted Domains
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Opcenter Quality
Search vendor "Siemens" for product "Opcenter Quality"
--
Affected
Siemens
Search vendor "Siemens"
Simatic Pcs Neo
Search vendor "Siemens" for product "Simatic Pcs Neo"
< 4.1
Search vendor "Siemens" for product "Simatic Pcs Neo" and version " < 4.1"
-
Affected
Siemens
Search vendor "Siemens"
Sinumerik Integrate Runmyhmi \/automotive
Search vendor "Siemens" for product "Sinumerik Integrate Runmyhmi \/automotive"
--
Affected
Siemens
Search vendor "Siemens"
Totally Integrated Automation Portal
Search vendor "Siemens" for product "Totally Integrated Automation Portal"
>= 14.0 < 15
Search vendor "Siemens" for product "Totally Integrated Automation Portal" and version " >= 14.0 < 15"
-
Affected
Siemens
Search vendor "Siemens"
Totally Integrated Automation Portal
Search vendor "Siemens" for product "Totally Integrated Automation Portal"
>= 15 < 16
Search vendor "Siemens" for product "Totally Integrated Automation Portal" and version " >= 15 < 16"
-
Affected
Siemens
Search vendor "Siemens"
Totally Integrated Automation Portal
Search vendor "Siemens" for product "Totally Integrated Automation Portal"
>= 16 < 17
Search vendor "Siemens" for product "Totally Integrated Automation Portal" and version " >= 16 < 17"
-
Affected
Siemens
Search vendor "Siemens"
Totally Integrated Automation Portal
Search vendor "Siemens" for product "Totally Integrated Automation Portal"
>= 17 < 18
Search vendor "Siemens" for product "Totally Integrated Automation Portal" and version " >= 17 < 18"
-
Affected
Siemens
Search vendor "Siemens"
Totally Integrated Automation Portal
Search vendor "Siemens" for product "Totally Integrated Automation Portal"
--
Affected
Siemens
Search vendor "Siemens"
Totally Integrated Automation Portal
Search vendor "Siemens" for product "Totally Integrated Automation Portal"
18
Search vendor "Siemens" for product "Totally Integrated Automation Portal" and version "18"
-
Affected
Siemens
Search vendor "Siemens"
Totally Integrated Automation Portal
Search vendor "Siemens" for product "Totally Integrated Automation Portal"
18
Search vendor "Siemens" for product "Totally Integrated Automation Portal" and version "18"
update_1
Affected