Path Traversal Vulnerability in SIMATIC Cloud Connect Products by Siemens
CVE-2023-29128

3.8LOW

Key Information:

Summary

A path traversal vulnerability has been discovered in the upload feature of the web-based management interface of SIMATIC Cloud Connect 7 CC712 and CC716. This flaw allows an authenticated and privileged remote attacker to exploit the filename used during the upload process. By manipulating the upload path, the attacker can write arbitrary files with a .db extension to the device, posing significant risks to the integrity and confidentiality of the system. Organizations using the affected products should take prompt action to mitigate this vulnerability.

Affected Version(s)

SIMATIC Cloud Connect 7 CC712 All versions >= V2.0 < V2.1

SIMATIC Cloud Connect 7 CC716 All versions >= V2.0 < V2.1

References

CVSS V3.1

Score:
3.8
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.