Local Code Execution Vulnerability in SIMATIC Automation Tools by Siemens
CVE-2020-7580

6.7MEDIUM

Key Information:

Summary

A vulnerability has been identified in various Siemens SIMATIC applications that allows a local attacker to execute arbitrary code with SYSTEM privileges. This issue arises because a common component frequently invokes a helper binary without properly quoting the call path, which may lead to unintended code execution with elevated privileges. Affected applications span across several SIMATIC products, including but not limited to the Automation Tool, PROsave, Step 7, and WinCC, highlighting a significant concern for users. It is imperative for organizations using these software versions to update to secure versions to mitigate this risk.

Affected Version(s)

SIMATIC Automation Tool All versions < V4 SP2

SIMATIC NET PC Software V14 All versions < V14 SP1 Update 14

SIMATIC NET PC Software V15 All versions

References

CVSS V3.1

Score:
6.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.