CVE-2021-40358

A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:siemens:simatic_pcs_7:8.2:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update10:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update11:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update12:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update13:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update14:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update15:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update16:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update17:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update18:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update6:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update7:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update8:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update9:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:update_1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_6:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:update1:*:*:*:*:*:*

History

11 Apr 2023, 10:15

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 9.9

19 Oct 2022, 19:36

Type Values Removed Values Added
CPE cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update12:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:update_1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update14:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update11:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update18:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update8:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update16:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update15:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update10:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update13:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update9:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update17:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update7:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update6:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_6:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:8.2:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.1:-:*:*:*:*:*:*

20 May 2022, 13:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files. A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files.

29 Apr 2022, 17:12

Type Values Removed Values Added
CPE cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update4:*:*:*:*:*:*

12 Apr 2022, 09:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 and earlier (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files. A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files.

08 Mar 2022, 12:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 and earlier (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files. A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 and earlier (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files.

09 Feb 2022, 16:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V7.4 and earlier (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files. A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 and earlier (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files.

11 Nov 2021, 02:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
References (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf - (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf - Vendor Advisory
CPE cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15:*:*:*:*:*:*:*

09 Nov 2021, 12:23

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-09 12:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-40358

Mitre link : CVE-2021-40358

CVE.ORG link : CVE-2021-40358


JSON object : View

Products Affected

siemens

  • simatic_pcs_7
  • simatic_wincc
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')