Vulnerability Details : CVE-2019-10935
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd 11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC Professional (TIA Portal V13) (All versions), SIMATIC WinCC Professional (TIA Portal V14) (All versions < V14 SP1 Upd 9), SIMATIC WinCC Professional (TIA Portal V15) (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). The SIMATIC WinCC DataMonitor web application of the affected products allows to upload arbitrary ASPX code. The security vulnerability could be exploited by an authenticated attacker with network access to the WinCC DataMonitor application. No user interaction is required to exploit this vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the affected device. At the stage of publishing this security advisory no public exploitation is known.
Products affected by CVE-2019-10935
- cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.3:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.3:update_4:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.3:update_1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:update_1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.3:update_11:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.3:update_10:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.3:update_13:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:14:sp1:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15:*:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:13:-:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:14:*:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:13:sp2:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:14:-:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_7:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_7:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_7:8.2:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_7:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_runtime:13:-:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_runtime:14:-:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_runtime:14:sp1:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_runtime:15:-:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_runtime:15:update_4:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_runtime:15.1:-:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_runtime:13:sp1:update_9:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_runtime:13:*:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_runtime:13:sp1:update_2:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_runtime:13:sp2:*:*:professional:*:*:*
- cpe:2.3:a:siemens:simatic_wincc_runtime:15.1:update_1:*:*:professional:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-10935
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-10935
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
7.2
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2019-10935
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by:
- nvd@nist.gov (Primary)
- productcert@siemens.com (Secondary)
References for CVE-2019-10935
-
https://cert-portal.siemens.com/productcert/pdf/ssa-121293.pdf
Patch;Vendor Advisory
Jump to