CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2016-7165

A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC IT Production Suite (All versions < V7.0 SP1 HFX 2), SIMATIC NET PC-Software (All versions < V14), SIMATIC PCS 7 V7.1 (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 V5.X (All versions < V5.5 SP4 HF11), SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced (All versions < V14), SIMATIC WinCC (TIA Portal) Professional V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) Professional V14 (All versions < V14 SP1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1), SIMATIC WinCC V7.0 SP2 and earlier versions (All versions < V7.0 SP2 Upd 12), SIMATIC WinCC V7.0 SP3 (All versions < V7.0 SP3 Upd 8), SIMATIC WinCC V7.2 (All versions < V7.2 Upd 14), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 11), SIMATIC WinCC V7.4 (All versions < V7.4 SP1), SIMIT V9.0 (All versions < V9.0 SP1), SINEMA Remote Connect Client (All versions < V1.0 SP3), SINEMA Server (All versions < V13 SP2), SOFTNET Security Client V5.0 (All versions), Security Configuration Tool (SCT) (All versions < V4.3 HF1), TeleControl Server Basic (All versions < V3.0 SP2), WinAC RTX 2010 SP2 (All versions), WinAC RTX F 2010 SP2 (All versions). Unquoted service paths could allow local Microsoft Windows operating system users to escalate their privileges if the affected products are not installed under their default path ("C:\Program Files\*" or the localized equivalent).
Publish Date : 2016-11-15 Last Update Date : 2018-06-14
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
6.9
Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)
Integrity Impact Complete (There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)
Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)
Access Complexity Medium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s)
CWE ID 284

- Products Affected By CVE-2016-7165

# Product Type Vendor Product Version Update Edition Language
1 Application Siemens Primary Setup Tool - Version Details Vulnerabilities
2 Application Siemens Security Configuration Tool - Version Details Vulnerabilities
3 Application Siemens Simatic It Production Suite - Version Details Vulnerabilities
4 Application Siemens Simatic Net Pc Software 14.0 Version Details Vulnerabilities
5 Application Siemens Simatic Pcs 7 7.1 Version Details Vulnerabilities
6 Application Siemens Simatic Pcs7 8.0 Version Details Vulnerabilities
7 Application Siemens Simatic Pcs7 8.1 Version Details Vulnerabilities
8 Application Siemens Simatic Pcs7 8.2 Version Details Vulnerabilities
9 Application Siemens Simatic Step 7 5.5 SP4 Version Details Vulnerabilities
10 Application Siemens Simatic Step 7 (tia Portal) 14.0 Version Details Vulnerabilities
11 Application Siemens Simatic Winac Rtx 2010 - Version Details Vulnerabilities
12 Application Siemens Simatic Winac Rtx F 2010 - Version Details Vulnerabilities
13 Application Siemens Simatic Wincc 7.0 SP2 Version Details Vulnerabilities
14 Application Siemens Simatic Wincc 7.0 SP3 Version Details Vulnerabilities
15 Application Siemens Simatic Wincc 7.2 Version Details Vulnerabilities
16 Application Siemens Simatic Wincc 7.3 Version Details Vulnerabilities
17 Application Siemens Simatic Wincc 7.4 Version Details Vulnerabilities
18 Application Siemens Simatic Wincc (tia Portal) - ~~professional~~~ Version Details Vulnerabilities
19 Application Siemens Simatic Wincc (tia Portal) 14.0 ~~comfort~~~ Version Details Vulnerabilities
20 Application Siemens Simatic Wincc (tia Portal) 14.0 ~~advanced~~~ Version Details Vulnerabilities
21 Application Siemens Simatic Wincc (tia Portal) 14.0 ~~basic~~~ Version Details Vulnerabilities
22 Application Siemens Simatic Wincc Runtime - ~~professional~~~ Version Details Vulnerabilities
23 Application Siemens Simit 9.0 Version Details Vulnerabilities
24 Application Siemens Sinema Remote Connect - Version Details Vulnerabilities
25 Application Siemens Sinema Server 13.0 SP2 Version Details Vulnerabilities
26 Application Siemens Softnet Security Client 5.0 Version Details Vulnerabilities
27 Application Siemens Telecontrol Basic 3.0 SP2 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Siemens Primary Setup Tool 1
Siemens Security Configuration Tool 1
Siemens Simatic It Production Suite 1
Siemens Simatic Net Pc Software 1
Siemens Simatic Pcs 7 1
Siemens Simatic Pcs7 3
Siemens Simatic Step 7 1
Siemens Simatic Step 7 (tia Portal) 1
Siemens Simatic Winac Rtx 2010 1
Siemens Simatic Winac Rtx F 2010 1
Siemens Simatic Wincc 5
Siemens Simatic Wincc (tia Portal) 4
Siemens Simatic Wincc Runtime 1
Siemens Simit 1
Siemens Sinema Remote Connect 1
Siemens Sinema Server 1
Siemens Softnet Security Client 1
Siemens Telecontrol Basic 1

- References For CVE-2016-7165

https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf CONFIRM
https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02
http://www.securityfocus.com/bid/94158
BID 94158 Multiple Siemens Products CVE-2016-7165 Local Privilege Escalation Vulnerability Release Date:2016-11-11
http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html

- Metasploit Modules Related To CVE-2016-7165

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.