Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*", "matchCriteriaId": "13E3BDF0-B691-4A97-A74A-A65EC910480E", "vulnerable": true}, {"criteria": "cpe:2.3:a:siemens:simatic_process_device_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "50C02E17-87F5-47DB-B4F3-EFC44B0DFC88", "vulnerable": true}, {"criteria": "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAF09D6E-3375-4731-B16D-30B7592EA5FB", "versionEndExcluding": "5.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:siemens:simatic_step_7:5.6:-:*:*:*:*:*:*", "matchCriteriaId": "851F8474-4568-487D-98FB-47DF7EAEAC3B", "vulnerable": true}, {"criteria": "cpe:2.3:a:siemens:simatic_step_7:5.6:sp1:*:*:*:*:*:*", "matchCriteriaId": "81EADA2F-884C-4D72-8489-71025B3EBAEE", "vulnerable": true}, {"criteria": "cpe:2.3:a:siemens:simatic_step_7:5.6:sp2:*:*:*:*:*:*", "matchCriteriaId": "78366D2F-B728-47F6-B539-5FB2D1B0419D", "vulnerable": true}, {"criteria": "cpe:2.3:a:siemens:simatic_step_7:5.6:sp2_hotfix1:*:*:*:*:*:*", "matchCriteriaId": "06A86DA0-BC1F-4306-B02E-ED2FA36BE273", "vulnerable": true}, {"criteria": "cpe:2.3:a:siemens:sinamics_starter:*:*:*:*:*:*:*:*", "matchCriteriaId": "23020179-5112-48A8-BA76-EB6C073867BF", "versionEndExcluding": "5.4", "vulnerable": true}, {"criteria": "cpe:2.3:a:siemens:sinamics_starter:5.4:-:*:*:*:*:*:*", "matchCriteriaId": "E04348B3-6DAC-49E2-A612-FE0A3166776B", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC PDM (All versions < V9.2), SIMATIC STEP 7 V5.X (All versions < V5.6 SP2 HF3), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 HF2). A DLL Hijacking vulnerability could allow a local attacker to execute code with elevated privileges. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise the availability of the system as well as to have access to confidential information."}, {"lang": "es", "value": "Se ha identificado una vulnerabilidad en SIMATIC PCS 7 V8.2 y anteriores (Todas las versiones), SIMATIC PCS 7 V9.0 (Todas las versiones anteriores a V9.0 SP3), SIMATIC PDM (Todas las versiones anteriores a V9.2), SIMATIC STEP 7 V5.X (Todas las versiones anteriores a V5.6 SP2 HF3), SINAMICS STARTER (que contiene la versi\u00f3n OEM de STEP 7) (Todas las versiones anteriores a V5.4 HF2). Una vulnerabilidad de Secuestro de DLL podr\u00eda permitir a un atacante local ejecutar c\u00f3digo con privilegios elevados. La vulnerabilidad de seguridad podr\u00eda ser explotada por parte de un atacante con acceso local a los sistemas afectados. Una explotaci\u00f3n con \u00e9xito requiere privilegios de usuario pero no interacci\u00f3n del usuario. La vulnerabilidad podr\u00eda permitir a un atacante comprometer la disponibilidad del sistema, as\u00ed como tener acceso a informaci\u00f3n confidencial"}], "id": "CVE-2020-7585", "lastModified": "2024-11-21T05:37:25.310", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-06-10T17:15:12.457", "references": [{"source": "productcert@siemens.com", "tags": ["Vendor Advisory"], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689942.pdf"}, {"source": "productcert@siemens.com", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-161-05"}, {"source": "productcert@siemens.com", "tags": ["Third Party Advisory", "US Government Resource"], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-161-05"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689942.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-161-05"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "US Government Resource"], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-161-05"}], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-427"}], "source": "productcert@siemens.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-427"}], "source": "nvd@nist.gov", "type": "Secondary"}]}