Vulnerability Details : CVE-2021-40358
A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files.
Vulnerability category: Directory traversal
Products affected by CVE-2021-40358
- cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:update_1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:update_1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:update_2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:update_3:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:update_4:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update10:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update11:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update12:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update13:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update3:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update4:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update5:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update6:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update7:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update8:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update9:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:17:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:16:update1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:16:update2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:16:update3:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:16:update4:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:17:update1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:update_6:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:update_5:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update14:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update15:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update16:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update17:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update18:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_7:8.2:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_7:9.1:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-40358
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-40358
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
9.9
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
3.1
|
6.0
|
Siemens AG |
CWE ids for CVE-2021-40358
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by:
- nvd@nist.gov (Secondary)
- productcert@siemens.com (Primary)
References for CVE-2021-40358
-
https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf
Vendor Advisory
Jump to