ID

VAR-201502-0368


CVE

CVE-2015-1356


TITLE

Siemens SIMATIC STEP 7 Security Bypass Vulnerability

Trust: 1.0

sources: IVD: a11c06b2-2351-11e6-abef-000c29c66e3d // IVD: 81780777-a6de-421d-8743-cc36867b1e0a // CNVD: CNVD-2015-01198

DESCRIPTION

Siemens SIMATIC STEP 7 (TIA Portal) before 13 SP1 determines a user's privileges on the basis of project-file fields that lack integrity protection, which allows remote attackers to establish arbitrary authorization data via a modified file. Siemens SIMATIC is an automation software in a single engineering environment. Siemens SIMATIC STEP 7 is prone to a a security-bypass vulnerability. Attackers can exploit this issue to perform unauthorized actions with elevated privileges. Versions prior to SIMATIC STEP 7 V13 SP1 are vulnerable. Siemens SIMATIC STEP 7 (TIA Portal) is a set of programming software for SIMATIC controllers from Siemens, Germany. The software provides PLC programming, design option packages, advanced drive technology and more

Trust: 2.88

sources: NVD: CVE-2015-1356 // JVNDB: JVNDB-2015-001536 // CNVD: CNVD-2015-01198 // BID: 72627 // IVD: a11c06b2-2351-11e6-abef-000c29c66e3d // IVD: 81780777-a6de-421d-8743-cc36867b1e0a // VULHUB: VHN-79317

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: a11c06b2-2351-11e6-abef-000c29c66e3d // IVD: 81780777-a6de-421d-8743-cc36867b1e0a // CNVD: CNVD-2015-01198

AFFECTED PRODUCTS

vendor:siemensmodel:simatic step 7scope:lteversion:13.0

Trust: 1.0

vendor:siemensmodel:simatic step 7scope:ltversion:13 sp1

Trust: 0.8

vendor:siemensmodel:simatic step sp1scope:eqversion:7v13

Trust: 0.6

vendor:siemensmodel:simatic step 7scope:eqversion:13.0

Trust: 0.6

vendor:simatic step 7model: - scope:eqversion:*

Trust: 0.4

sources: IVD: a11c06b2-2351-11e6-abef-000c29c66e3d // IVD: 81780777-a6de-421d-8743-cc36867b1e0a // CNVD: CNVD-2015-01198 // JVNDB: JVNDB-2015-001536 // CNNVD: CNNVD-201502-421 // NVD: CVE-2015-1356

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-1356
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-1356
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-01198
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201502-421
value: MEDIUM

Trust: 0.6

IVD: a11c06b2-2351-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 81780777-a6de-421d-8743-cc36867b1e0a
value: MEDIUM

Trust: 0.2

VULHUB: VHN-79317
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-1356
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-01198
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: a11c06b2-2351-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 81780777-a6de-421d-8743-cc36867b1e0a
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-79317
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: a11c06b2-2351-11e6-abef-000c29c66e3d // IVD: 81780777-a6de-421d-8743-cc36867b1e0a // CNVD: CNVD-2015-01198 // VULHUB: VHN-79317 // JVNDB: JVNDB-2015-001536 // CNNVD: CNNVD-201502-421 // NVD: CVE-2015-1356

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-79317 // JVNDB: JVNDB-2015-001536 // NVD: CVE-2015-1356

THREAT TYPE

local

Trust: 0.9

sources: BID: 72627 // CNNVD: CNNVD-201502-421

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201502-421

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001536

PATCH

title:SSA-234789url:http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-234789.pdf

Trust: 0.8

title:Siemens SIMATIC STEP 7 security bypass vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/55646

Trust: 0.6

sources: CNVD: CNVD-2015-01198 // JVNDB: JVNDB-2015-001536

EXTERNAL IDS

db:NVDid:CVE-2015-1356

Trust: 3.9

db:SIEMENSid:SSA-234789

Trust: 2.3

db:CNNVDid:CNNVD-201502-421

Trust: 1.1

db:CNVDid:CNVD-2015-01198

Trust: 1.0

db:BIDid:72627

Trust: 1.0

db:JVNDBid:JVNDB-2015-001536

Trust: 0.8

db:IVDid:A11C06B2-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:81780777-A6DE-421D-8743-CC36867B1E0A

Trust: 0.2

db:VULHUBid:VHN-79317

Trust: 0.1

db:PACKETSTORMid:130405

Trust: 0.1

sources: IVD: a11c06b2-2351-11e6-abef-000c29c66e3d // IVD: 81780777-a6de-421d-8743-cc36867b1e0a // CNVD: CNVD-2015-01198 // VULHUB: VHN-79317 // BID: 72627 // JVNDB: JVNDB-2015-001536 // PACKETSTORM: 130405 // CNNVD: CNNVD-201502-421 // NVD: CVE-2015-1356

REFERENCES

url:http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-234789.pdf

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1356

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1356

Trust: 0.8

url:http://subscriber.communications.siemens.com/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1356

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1355

Trust: 0.1

sources: CNVD: CNVD-2015-01198 // VULHUB: VHN-79317 // BID: 72627 // JVNDB: JVNDB-2015-001536 // PACKETSTORM: 130405 // CNNVD: CNNVD-201502-421 // NVD: CVE-2015-1356

CREDITS

Aleksandr Timorin from Positive Technologies

Trust: 0.3

sources: BID: 72627

SOURCES

db:IVDid:a11c06b2-2351-11e6-abef-000c29c66e3d
db:IVDid:81780777-a6de-421d-8743-cc36867b1e0a
db:CNVDid:CNVD-2015-01198
db:VULHUBid:VHN-79317
db:BIDid:72627
db:JVNDBid:JVNDB-2015-001536
db:PACKETSTORMid:130405
db:CNNVDid:CNNVD-201502-421
db:NVDid:CVE-2015-1356

LAST UPDATE DATE

2024-11-23T21:44:26.563000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-01198date:2015-02-27T00:00:00
db:VULHUBid:VHN-79317date:2015-02-18T00:00:00
db:BIDid:72627date:2015-03-19T07:29:00
db:JVNDBid:JVNDB-2015-001536date:2015-02-20T00:00:00
db:CNNVDid:CNNVD-201502-421date:2015-03-02T00:00:00
db:NVDid:CVE-2015-1356date:2024-11-21T02:25:14.677

SOURCES RELEASE DATE

db:IVDid:a11c06b2-2351-11e6-abef-000c29c66e3ddate:2015-02-27T00:00:00
db:IVDid:81780777-a6de-421d-8743-cc36867b1e0adate:2015-02-27T00:00:00
db:CNVDid:CNVD-2015-01198date:2015-02-27T00:00:00
db:VULHUBid:VHN-79317date:2015-02-18T00:00:00
db:BIDid:72627date:2015-02-13T00:00:00
db:JVNDBid:JVNDB-2015-001536date:2015-02-20T00:00:00
db:PACKETSTORMid:130405date:2015-02-16T17:36:59
db:CNNVDid:CNNVD-201502-421date:2015-02-17T00:00:00
db:NVDid:CVE-2015-1356date:2015-02-18T02:59:06.703