COMOS PDMS/E3D Interface Vulnerability Could Allow File Extraction
CVE-2024-54005
5.1MEDIUM
Key Information
- Vendor
- Siemens
- Status
- Comos V10.3
- Comos V10.4.0
- Comos V10.4.1
- Comos V10.4.2
- Vendor
- CVE Published:
- 10 December 2024
Summary
A vulnerability has been identified in COMOS V10.3 (All versions < V10.3.3.5.8), COMOS V10.4.0 (All versions), COMOS V10.4.1 (All versions), COMOS V10.4.2 (All versions), COMOS V10.4.3 (All versions < V10.4.3.0.47), COMOS V10.4.4 (All versions < V10.4.4.2), COMOS V10.4.4.1 (All versions < V10.4.4.1.21). The PDMS/E3D Engineering Interface improperly handles XML External Entity (XXE) entries when communicating with an external application. This could allow an attacker to extract any file with a known location on the user's system or accessible network folders by injecting malicious data into the communication channel between the two systems.
Affected Version(s)
COMOS V10.3 < 0
COMOS V10.4.0 < 0
COMOS V10.4.1 < 0
Refferences
CVSS V3.1
Score:
5.1
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database