A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted. This could allow a local attacker with administrative privileges to execute code with SYSTEM level privileges.
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Opcenter_execution_discrete | Siemens | * | 3.2 (excluding) |
Opcenter_execution_foundation | Siemens | * | 3.2 (excluding) |
Opcenter_execution_process | Siemens | * | 3.2 (excluding) |
Opcenter_intelligence | Siemens | * | * |
Opcenter_quality | Siemens | * | 11.3 (excluding) |
Opcenter_rd&l | Siemens | 8.0 (including) | 8.0 (including) |
Simatic_notifier_server | Siemens | * | * |
Simatic_pcs_neo | Siemens | * | * |
Simatic_step_7 | Siemens | * | 16 (excluding) |
Simatic_step_7 | Siemens | 16 (including) | 16 (including) |
Simatic_step_7 | Siemens | 16-update1 (including) | 16-update1 (including) |
Simocode_es | Siemens | * | * |
Soft_starter_es | Siemens | * | * |