Path Traversal Vulnerability in SIMATIC Cloud Connect Products by Siemens
CVE-2023-29128
3.8LOW
Key Information:
- Vendor
- Siemens
- Vendor
- CVE Published:
- 9 May 2023
Summary
A path traversal vulnerability has been discovered in the upload feature of the web-based management interface of SIMATIC Cloud Connect 7 CC712 and CC716. This flaw allows an authenticated and privileged remote attacker to exploit the filename used during the upload process. By manipulating the upload path, the attacker can write arbitrary files with a .db
extension to the device, posing significant risks to the integrity and confidentiality of the system. Organizations using the affected products should take prompt action to mitigate this vulnerability.
Affected Version(s)
SIMATIC Cloud Connect 7 CC712 All versions >= V2.0 < V2.1
SIMATIC Cloud Connect 7 CC716 All versions >= V2.0 < V2.1
References
CVSS V3.1
Score:
3.8
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved