Vulnerability Details : CVE-2020-7588
A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions < V2.6), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending a specially crafted packet to the affected service could cause a partial remote denial-of-service, that would cause the service to restart itself.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2020-7588
- cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_step_7:16:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_step_7:16:update_1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_it_production_suite:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_quality:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_execution_discrete:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_execution_foundation:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_execution_process:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_rd\&l:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_notifier_server:*:*:*:*:*:windows:*:*
- cpe:2.3:a:siemens:simocode_es:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:soft_starter_es:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_it_lms:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-7588
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 43 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-7588
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2020-7588
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by:
- nvd@nist.gov (Secondary)
- productcert@siemens.com (Primary)
References for CVE-2020-7588
-
https://cert-portal.siemens.com/productcert/pdf/ssa-841348.pdf
Vendor Advisory
Jump to