Vulnerability Details : CVE-2016-7165
A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC IT Production Suite (All versions < V7.0 SP1 HFX 2), SIMATIC NET PC-Software (All versions < V14), SIMATIC PCS 7 V7.1 (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 V5.X (All versions < V5.5 SP4 HF11), SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced (All versions < V14), SIMATIC WinCC (TIA Portal) Professional V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) Professional V14 (All versions < V14 SP1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1), SIMATIC WinCC V7.0 SP2 and earlier versions (All versions < V7.0 SP2 Upd 12), SIMATIC WinCC V7.0 SP3 (All versions < V7.0 SP3 Upd 8), SIMATIC WinCC V7.2 (All versions < V7.2 Upd 14), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 11), SIMATIC WinCC V7.4 (All versions < V7.4 SP1), SIMIT V9.0 (All versions < V9.0 SP1), SINEMA Remote Connect Client (All versions < V1.0 SP3), SINEMA Server (All versions < V13 SP2), SOFTNET Security Client V5.0 (All versions), Security Configuration Tool (SCT) (All versions < V4.3 HF1), TeleControl Server Basic (All versions < V3.0 SP2), WinAC RTX 2010 SP2 (All versions), WinAC RTX F 2010 SP2 (All versions). Unquoted service paths could allow local Microsoft Windows operating system users to escalate their privileges if the affected products are not installed under their default path ("C:\Program Files\*" or the localized equivalent).
Products affected by CVE-2016-7165
- cpe:2.3:a:siemens:simatic_wincc:*:sp2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.2:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.3:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_runtime:-:*:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_step_7:*:sp4:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs7:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs7:8.2:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:sinema_server:*:sp2:*:*:*:*:*:*
- cpe:2.3:a:siemens:primary_setup_tool:-:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:security_configuration_tool:-:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simit:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:softnet_security_client:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:telecontrol_basic:*:sp2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_it_production_suite:-:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_winac_rtx_f_2010:-:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_winac_rtx_2010:-:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:sinema_remote_connect:-:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_net_pc_software:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_step_7_\(tia_portal\):*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_\(tia_portal\):*:*:*:*:advanced:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_\(tia_portal\):*:*:*:*:basic:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_\(tia_portal\):*:*:*:*:comfort:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_\(tia_portal\):-:*:*:*:professional:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-7165
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-7165
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST | |
6.4
|
MEDIUM | CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.5
|
5.9
|
NIST |
CWE ids for CVE-2016-7165
-
Assigned by: nvd@nist.gov (Primary)
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7165
-
https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02
Siemens Industrial Products Local Privilege Escalation Vulnerability (Update H) | CISAThird Party Advisory;US Government Resource
-
http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html
CVE-2016-7165 Privilege Escalation flaw affects many Siemens solutionsSecurity AffairsThird Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf
-
http://www.securityfocus.com/bid/94158
Multiple Siemens Products CVE-2016-7165 Local Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
Jump to