ID

VAR-202402-1389


CVE

CVE-2023-48364


TITLE

Null pointer dereference vulnerability (CNVD-2024-09314) in multiple Siemens products

Trust: 0.6

sources: CNVD: CNVD-2024-09314

DESCRIPTION

A vulnerability has been identified in OpenPCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 UC05), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 Update 4). The implementation of the RPC (Remote Procedure call) communication protocol in the affected products do not properly handle certain malformed RPC messages. An attacker could use this vulnerability to cause a denial of service condition in the RPC server. SIMATIC PCS 7 is a distributed control system (DCS) that integrates SIMATIC WinCC, SIMATIC Batch, SIMATIC Route control, OpenPCS 7 and other components. SIMATIC WinCC is a supervisory control and data acquisition (SCADA) system. SIMATIC WinCC Runtime Professional is a visual runtime platform for operator control and monitoring of machines and plants

Trust: 1.53

sources: NVD: CVE-2023-48364 // CNVD: CNVD-2024-09314 // VULMON: CVE-2023-48364

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-09314

AFFECTED PRODUCTS

vendor:siemensmodel:simatic winccscope:eqversion:v7.4

Trust: 0.6

vendor:siemensmodel:simatic pcsscope:eqversion:7v9.1

Trust: 0.6

vendor:siemensmodel:openpcsscope:eqversion:79.1

Trust: 0.6

vendor:siemensmodel:simatic batchscope:eqversion:9.1

Trust: 0.6

vendor:siemensmodel:simatic route controlscope:eqversion:9.1

Trust: 0.6

vendor:siemensmodel:simatic wincc runtime professionalscope:eqversion:v18

Trust: 0.6

vendor:siemensmodel:simatic wincc runtime professionalscope:eqversion:v19

Trust: 0.6

vendor:siemensmodel:simatic wincc sp2 updatescope:ltversion:7.515

Trust: 0.6

vendor:siemensmodel:simatic wincc sp4scope:ltversion:8.0

Trust: 0.6

sources: CNVD: CNVD-2024-09314

CVSS

SEVERITY

CVSSV2

CVSSV3

productcert@siemens.com: CVE-2023-48364
value: HIGH

Trust: 1.0

CNVD: CNVD-2024-09314
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2024-09314
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

productcert@siemens.com: CVE-2023-48364
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2024-09314 // NVD: CVE-2023-48364

PROBLEMTYPE DATA

problemtype:CWE-476

Trust: 1.0

sources: NVD: CVE-2023-48364

PATCH

title:Patch for Null pointer dereference vulnerability (CNVD-2024-09314) in multiple Siemens productsurl:https://www.cnvd.org.cn/patchInfo/show/526516

Trust: 0.6

sources: CNVD: CNVD-2024-09314

EXTERNAL IDS

db:NVDid:CVE-2023-48364

Trust: 1.7

db:SIEMENSid:SSA-753746

Trust: 1.7

db:CNVDid:CNVD-2024-09314

Trust: 0.6

db:ICS CERTid:ICSA-24-046-12

Trust: 0.1

db:VULMONid:CVE-2023-48364

Trust: 0.1

sources: CNVD: CNVD-2024-09314 // VULMON: CVE-2023-48364 // NVD: CVE-2023-48364

REFERENCES

url:https://cert-portal.siemens.com/productcert/html/ssa-753746.html

Trust: 1.7

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-12

Trust: 0.1

sources: CNVD: CNVD-2024-09314 // VULMON: CVE-2023-48364 // NVD: CVE-2023-48364

SOURCES

db:CNVDid:CNVD-2024-09314
db:VULMONid:CVE-2023-48364
db:NVDid:CVE-2023-48364

LAST UPDATE DATE

2024-09-10T23:04:52.425000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-09314date:2024-02-21T00:00:00
db:VULMONid:CVE-2023-48364date:2024-02-13T00:00:00
db:NVDid:CVE-2023-48364date:2024-09-10T10:15:08.833

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-09314date:2024-02-23T00:00:00
db:VULMONid:CVE-2023-48364date:2024-02-13T00:00:00
db:NVDid:CVE-2023-48364date:2024-02-13T09:15:45.980