CVE Vulnerabilities

CVE-2023-30757

Protection Mechanism Failure

Published: Jun 13, 2023 | Modified: Dec 10, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A vulnerability has been identified in Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions), Totally Integrated Automation Portal (TIA Portal) V20 (All versions). The know-how protection feature in affected products does not properly update the encryption of existing program blocks when a project file is updated.

This could allow attackers with access to the project file to recover previous - yet unprotected - versions of the project without the knowledge of the know-how protection password.

Weakness

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

Affected Software

NameVendorStart VersionEnd Version
Totally_integrated_automation_portalSiemens14.0 (including)14.0 (including)
Totally_integrated_automation_portalSiemens15 (including)15 (including)
Totally_integrated_automation_portalSiemens15.1 (including)15.1 (including)
Totally_integrated_automation_portalSiemens16 (including)16 (including)
Totally_integrated_automation_portalSiemens17 (including)17 (including)
Totally_integrated_automation_portalSiemens18 (including)18 (including)

References