CVE-2019-10925

A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). An authenticated attacker could escalate privileges by sending specially crafted requests to the integrated webserver. The security vulnerability can be exploited by an attacker with network access to the device. Valid user credentials, but no user interaction are required. Successful exploitation compromises integrity and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
References
Link Resource
http://www.securityfocus.com/bid/108725 Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-816980.pdf Mitigation Vendor Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-19-162-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:simatic_mv420_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_mv420:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:simatic_mv440_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_mv440:-:*:*:*:*:*:*:*

History

15 Mar 2021, 18:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). An authenticated attacker could escalate privileges by sending specially crafted requests to the integrated webserver. The security vulnerability can be exploited by an attacker with network access to the device. Valid user credentials, but no user interaction are required. Successful exploitation compromises integrity and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known. A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). An authenticated attacker could escalate privileges by sending specially crafted requests to the integrated webserver. The security vulnerability can be exploited by an attacker with network access to the device. Valid user credentials, but no user interaction are required. Successful exploitation compromises integrity and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.

15 Mar 2021, 17:15

Type Values Removed Values Added
CWE NVD-CWE-noinfo CWE-284
Summary A vulnerability has been identified in SIMATIC Ident MV420 family (All versions), SIMATIC Ident MV440 family (All versions). An authenticated attacker could escalate privileges by sending specially crafted requests to the integrated webserver. The security vulnerability can be exploited by an attacker with network access to the device. Valid user credentials, but no user interaction are required. Successful exploitation compromises integrity and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known. A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). An authenticated attacker could escalate privileges by sending specially crafted requests to the integrated webserver. The security vulnerability can be exploited by an attacker with network access to the device. Valid user credentials, but no user interaction are required. Successful exploitation compromises integrity and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.

Information

Published : 2019-06-12 14:29

Updated : 2023-12-10 12:59


NVD link : CVE-2019-10925

Mitre link : CVE-2019-10925

CVE.ORG link : CVE-2019-10925


JSON object : View

Products Affected

siemens

  • simatic_mv440
  • simatic_mv420
  • simatic_mv440_firmware
  • simatic_mv420_firmware
CWE
CWE-284

Improper Access Control

NVD-CWE-noinfo