Vulnerability Details : CVE-2020-7581
A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted. This could allow a local attacker with administrative privileges to execute code with SYSTEM level privileges.
Vulnerability category: Execute code
Products affected by CVE-2020-7581
- cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_step_7:16:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_step_7:16:update1:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_quality:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_execution_discrete:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_execution_foundation:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_execution_process:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_rd\&l:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_notifier_server:*:*:*:*:*:windows:*:*
- cpe:2.3:a:siemens:simocode_es:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:soft_starter_es:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-7581
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-7581
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
6.7
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.8
|
5.9
|
NIST |
CWE ids for CVE-2020-7581
-
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.Assigned by:
- nvd@nist.gov (Secondary)
- productcert@siemens.com (Primary)
References for CVE-2020-7581
-
https://cert-portal.siemens.com/productcert/pdf/ssa-841348.pdf
Vendor Advisory
Jump to