ID

VAR-202302-0938


CVE

CVE-2023-24980


TITLE

Siemens Tecnomatix Plant Simulation SPP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-23-188

DESCRIPTION

A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19790). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SPP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure

Trust: 1.62

sources: NVD: CVE-2023-24980 // ZDI: ZDI-23-188 // VULMON: CVE-2023-24980

AFFECTED PRODUCTS

vendor:siemensmodel:tecnomatix plant simulationscope:ltversion:2201.0006

Trust: 1.0

vendor:siemensmodel:tecnomatix plant simulationscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-23-188 // NVD: CVE-2023-24980

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-24980
value: HIGH

Trust: 1.0

productcert@siemens.com: CVE-2023-24980
value: HIGH

Trust: 1.0

ZDI: CVE-2023-24980
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202302-1054
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2023-24980
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

ZDI: CVE-2023-24980
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-23-188 // CNNVD: CNNVD-202302-1054 // NVD: CVE-2023-24980 // NVD: CVE-2023-24980

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

sources: NVD: CVE-2023-24980

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1054

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202302-1054

PATCH

title:Siemens has issued an update to correct this vulnerability.url:https://cert-portal.siemens.com/productcert/html/ssa-847261.html

Trust: 0.7

title:Tecnomatix Plant Simulation Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=226466

Trust: 0.6

sources: ZDI: ZDI-23-188 // CNNVD: CNNVD-202302-1054

EXTERNAL IDS

db:NVDid:CVE-2023-24980

Trust: 2.4

db:SIEMENSid:SSA-847261

Trust: 1.7

db:ZDI_CANid:ZDI-CAN-19790

Trust: 0.7

db:ZDIid:ZDI-23-188

Trust: 0.7

db:CNNVDid:CNNVD-202302-1054

Trust: 0.6

db:VULMONid:CVE-2023-24980

Trust: 0.1

sources: ZDI: ZDI-23-188 // VULMON: CVE-2023-24980 // CNNVD: CNNVD-202302-1054 // NVD: CVE-2023-24980

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/html/ssa-847261.html

Trust: 0.7

url:https://cxsecurity.com/cveshow/cve-2023-24980/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-23-188 // VULMON: CVE-2023-24980 // CNNVD: CNNVD-202302-1054 // NVD: CVE-2023-24980

CREDITS

Simon Janz (@esj4y)

Trust: 0.7

sources: ZDI: ZDI-23-188

SOURCES

db:ZDIid:ZDI-23-188
db:VULMONid:CVE-2023-24980
db:CNNVDid:CNNVD-202302-1054
db:NVDid:CVE-2023-24980

LAST UPDATE DATE

2024-08-14T12:57:33.461000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-23-188date:2023-02-24T00:00:00
db:VULMONid:CVE-2023-24980date:2023-02-14T00:00:00
db:CNNVDid:CNNVD-202302-1054date:2023-02-23T00:00:00
db:NVDid:CVE-2023-24980date:2023-02-22T20:00:23.133

SOURCES RELEASE DATE

db:ZDIid:ZDI-23-188date:2023-02-24T00:00:00
db:VULMONid:CVE-2023-24980date:2023-02-14T00:00:00
db:CNNVDid:CNNVD-202302-1054date:2023-02-14T00:00:00
db:NVDid:CVE-2023-24980date:2023-02-14T11:15:16.623