ID

VAR-202204-0321


CVE

CVE-2021-42029


TITLE

SIMATIC STEP 7  Vulnerability in privilege management

Trust: 0.8

sources: JVNDB: JVNDB-2022-001568

DESCRIPTION

A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) V15 (All versions), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 5), SIMATIC STEP 7 (TIA Portal) V17 (All versions < V17 Update 2). An attacker could achieve privilege escalation on the web server of certain devices due to improper access control vulnerability in the engineering system software. The attacker needs to have direct access to the impacted web server. SIMATIC STEP 7 (TIA Portal) Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 2.25

sources: NVD: CVE-2021-42029 // JVNDB: JVNDB-2022-001568 // CNVD: CNVD-2022-28501 // VULMON: CVE-2021-42029

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-28501

AFFECTED PRODUCTS

vendor:siemensmodel:simatic step 7scope:gteversion:15

Trust: 1.0

vendor:siemensmodel:simatic step 7scope:eqversion:17

Trust: 1.0

vendor:siemensmodel:simatic step 7scope:eqversion:16

Trust: 1.0

vendor:siemensmodel:simatic step 7scope:ltversion:16

Trust: 1.0

vendor:シーメンスmodel:simatic step 7scope:eqversion: -

Trust: 0.8

vendor:シーメンスmodel:simatic step 7scope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic stepscope:eqversion:7v15

Trust: 0.6

vendor:siemensmodel:simatic step updatescope:eqversion:7v16<v165

Trust: 0.6

vendor:siemensmodel:simatic step updatescope:eqversion:7v17<v172

Trust: 0.6

sources: CNVD: CNVD-2022-28501 // JVNDB: JVNDB-2022-001568 // NVD: CVE-2021-42029

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-42029
value: HIGH

Trust: 1.0

NVD: CVE-2021-42029
value: HIGH

Trust: 0.8

CNVD: CNVD-2022-28501
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202204-2939
value: HIGH

Trust: 0.6

VULMON: CVE-2021-42029
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-42029
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2022-28501
severity: MEDIUM
baseScore: 5.2
vectorString: AV:L/AC:H/AU:N/C:C/I:P/A:P
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 1.9
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-42029
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-42029
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-28501 // VULMON: CVE-2021-42029 // JVNDB: JVNDB-2022-001568 // CNNVD: CNNVD-202204-2939 // NVD: CVE-2021-42029

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-284

Trust: 1.0

problemtype:Improper authority management (CWE-269) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-001568 // NVD: CVE-2021-42029

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202204-2939

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202204-2939

PATCH

title:SSA-350757url:https://cert-portal.siemens.com/productcert/pdf/ssa-350757.pdf

Trust: 0.8

title:Patch for Siemens TIA Portal Access Control Error Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/329176

Trust: 0.6

title:Siemens SIMATIC Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=203687

Trust: 0.6

sources: CNVD: CNVD-2022-28501 // JVNDB: JVNDB-2022-001568 // CNNVD: CNNVD-202204-2939

EXTERNAL IDS

db:NVDid:CVE-2021-42029

Trust: 3.9

db:SIEMENSid:SSA-350757

Trust: 2.3

db:ICS CERTid:ICSA-22-104-14

Trust: 1.5

db:JVNid:JVNVU91165555

Trust: 0.8

db:JVNDBid:JVNDB-2022-001568

Trust: 0.8

db:CNVDid:CNVD-2022-28501

Trust: 0.6

db:CS-HELPid:SB2022042135

Trust: 0.6

db:CNNVDid:CNNVD-202204-2939

Trust: 0.6

db:VULMONid:CVE-2021-42029

Trust: 0.1

sources: CNVD: CNVD-2022-28501 // VULMON: CVE-2021-42029 // JVNDB: JVNDB-2022-001568 // CNNVD: CNNVD-202204-2939 // NVD: CVE-2021-42029

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-350757.pdf

Trust: 2.3

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-14

Trust: 0.9

url:https://jvn.jp/vu/jvnvu91165555/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-42029

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-104-14

Trust: 0.6

url:https://vigilance.fr/vulnerability/simatic-privilege-escalation-via-tia-portal-38017

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022042135

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2021-42029/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/269.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2022-28501 // VULMON: CVE-2021-42029 // JVNDB: JVNDB-2022-001568 // CNNVD: CNNVD-202204-2939 // NVD: CVE-2021-42029

CREDITS

Siemens reported this vulnerability to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202204-2939

SOURCES

db:CNVDid:CNVD-2022-28501
db:VULMONid:CVE-2021-42029
db:JVNDBid:JVNDB-2022-001568
db:CNNVDid:CNNVD-202204-2939
db:NVDid:CVE-2021-42029

LAST UPDATE DATE

2024-08-14T13:42:54.996000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-28501date:2022-04-13T00:00:00
db:VULMONid:CVE-2021-42029date:2022-04-19T00:00:00
db:JVNDBid:JVNDB-2022-001568date:2022-04-22T06:27:00
db:CNNVDid:CNNVD-202204-2939date:2022-08-10T00:00:00
db:NVDid:CVE-2021-42029date:2022-08-09T00:31:06.290

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-28501date:2022-04-13T00:00:00
db:VULMONid:CVE-2021-42029date:2022-04-12T00:00:00
db:JVNDBid:JVNDB-2022-001568date:2022-04-22T00:00:00
db:CNNVDid:CNNVD-202204-2939date:2022-04-12T00:00:00
db:NVDid:CVE-2021-42029date:2022-04-12T09:15:13.817