ID

VAR-202302-0998


CVE

CVE-2023-24482


TITLE

Siemens'  COMOS  Classic buffer overflow vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-004055

DESCRIPTION

A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition. Siemens' COMOS Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2023-24482 // JVNDB: JVNDB-2023-004055 // VULHUB: VHN-453147 // VULMON: CVE-2023-24482

AFFECTED PRODUCTS

vendor:siemensmodel:comosscope:ltversion:10.3.3.2.33

Trust: 1.0

vendor:siemensmodel:comosscope:gteversion:10.3.3.3

Trust: 1.0

vendor:siemensmodel:comosscope:ltversion:10.3.3.3.9

Trust: 1.0

vendor:siemensmodel:comosscope:gteversion:10.3.3.4

Trust: 1.0

vendor:siemensmodel:comosscope:ltversion:10.3.3.4.6

Trust: 1.0

vendor:siemensmodel:comosscope:gteversion:10.2

Trust: 1.0

vendor:siemensmodel:comosscope:gteversion:10.4.1.0

Trust: 1.0

vendor:siemensmodel:comosscope:ltversion:10.4.1.0.32

Trust: 1.0

vendor:siemensmodel:comosscope:ltversion:10.3.3.1.45

Trust: 1.0

vendor:siemensmodel:comosscope:ltversion:10.4.0.0.31

Trust: 1.0

vendor:siemensmodel:comosscope:gteversion:10.4.0.0

Trust: 1.0

vendor:siemensmodel:comosscope:gteversion:10.3.3.2

Trust: 1.0

vendor:siemensmodel:comosscope:ltversion:10.4.2.0.25

Trust: 1.0

vendor:siemensmodel:comosscope:gteversion:10.4.2.0

Trust: 1.0

vendor:シーメンスmodel:comosscope:eqversion:10.2 that's all 10.3.3.1.45

Trust: 0.8

vendor:シーメンスmodel:comosscope:eqversion:10.4.1.0 that's all 10.4.1.0.32

Trust: 0.8

vendor:シーメンスmodel:comosscope:eqversion:10.4.2.0 that's all 10.4.2.0.25

Trust: 0.8

vendor:シーメンスmodel:comosscope:eqversion: -

Trust: 0.8

vendor:シーメンスmodel:comosscope:eqversion:10.3.3.4 that's all 10.3.3.4.6

Trust: 0.8

vendor:シーメンスmodel:comosscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:comosscope:eqversion:10.3.3.2 that's all 10.3.3.2.33

Trust: 0.8

vendor:シーメンスmodel:comosscope:eqversion:10.3.3.3 that's all 10.3.3.3.9

Trust: 0.8

vendor:シーメンスmodel:comosscope:eqversion:10.4.0.0 that's all 10.4.0.0.31

Trust: 0.8

sources: JVNDB: JVNDB-2023-004055 // NVD: CVE-2023-24482

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-24482
value: CRITICAL

Trust: 1.0

productcert@siemens.com: CVE-2023-24482
value: CRITICAL

Trust: 1.0

NVD: CVE-2023-24482
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202302-1154
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2023-24482
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

productcert@siemens.com: CVE-2023-24482
baseSeverity: CRITICAL
baseScore: 10.0
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2023-24482
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-004055 // CNNVD: CNNVD-202302-1154 // NVD: CVE-2023-24482 // NVD: CVE-2023-24482

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.1

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: VULHUB: VHN-453147 // JVNDB: JVNDB-2023-004055 // NVD: CVE-2023-24482

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202302-1154

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202302-1154

PATCH

title:Siemens Comos Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=225807

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2023-24482

Trust: 0.1

sources: VULMON: CVE-2023-24482 // CNNVD: CNNVD-202302-1154

EXTERNAL IDS

db:NVDid:CVE-2023-24482

Trust: 3.4

db:SIEMENSid:SSA-693110

Trust: 2.6

db:ICS CERTid:ICSA-23-047-10

Trust: 0.9

db:JVNid:JVNVU97514209

Trust: 0.8

db:JVNDBid:JVNDB-2023-004055

Trust: 0.8

db:AUSCERTid:ESB-2023.1208

Trust: 0.6

db:AUSCERTid:ESB-2023.0969

Trust: 0.6

db:CNNVDid:CNNVD-202302-1154

Trust: 0.6

db:VULHUBid:VHN-453147

Trust: 0.1

db:VULMONid:CVE-2023-24482

Trust: 0.1

sources: VULHUB: VHN-453147 // VULMON: CVE-2023-24482 // JVNDB: JVNDB-2023-004055 // CNNVD: CNNVD-202302-1154 // NVD: CVE-2023-24482

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-693110.pdf

Trust: 2.6

url:https://jvn.jp/vu/jvnvu97514209/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-24482

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-10

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2023.0969

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1208

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2023-24482/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/120.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2023-24482

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-23-047-10

Trust: 0.1

sources: VULHUB: VHN-453147 // VULMON: CVE-2023-24482 // JVNDB: JVNDB-2023-004055 // CNNVD: CNNVD-202302-1154 // NVD: CVE-2023-24482

SOURCES

db:VULHUBid:VHN-453147
db:VULMONid:CVE-2023-24482
db:JVNDBid:JVNDB-2023-004055
db:CNNVDid:CNNVD-202302-1154
db:NVDid:CVE-2023-24482

LAST UPDATE DATE

2024-08-14T12:09:45.897000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-453147date:2023-02-22T00:00:00
db:VULMONid:CVE-2023-24482date:2023-02-14T00:00:00
db:JVNDBid:JVNDB-2023-004055date:2023-10-25T07:39:00
db:CNNVDid:CNNVD-202302-1154date:2023-02-28T00:00:00
db:NVDid:CVE-2023-24482date:2023-02-22T15:43:48.470

SOURCES RELEASE DATE

db:VULHUBid:VHN-453147date:2023-02-14T00:00:00
db:VULMONid:CVE-2023-24482date:2023-02-14T00:00:00
db:JVNDBid:JVNDB-2023-004055date:2023-10-25T00:00:00
db:CNNVDid:CNNVD-202302-1154date:2023-02-14T00:00:00
db:NVDid:CVE-2023-24482date:2023-02-14T11:15:14.783