CVE-2021-40359
CVSS V2 Medium 5
CVSS V3 High 7.5
Description
A vulnerability has been identified in OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd4), OpenPCS 7 V9.1 (All versions), SIMATIC BATCH V8.2 (All versions), SIMATIC BATCH V9.0 (All versions), SIMATIC BATCH V9.1 (All versions), SIMATIC NET PC Software V14 (All versions), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Update 6), SIMATIC NET PC Software V17 (All versions < V17 SP1), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions), SIMATIC Route Control V9.1 (All versions), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). When downloading files, the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read unexpected critical files.
Overview
- CVE ID
- CVE-2021-40359
- Assigner
- productcert@siemens.com
- Vulnerability Status
- Modified
- Published Version
- 2021-11-09T12:15:09
- Last Modified Date
- 2023-04-11T10:15:10
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:siemens:simatic_batch:8.2:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_batch:8.2:upd_9:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_batch:9.0:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_batch:9.0:sp1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_batch:9.0:sp1_update_1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_batch:9.0:sp1_update_2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_batch:9.0:sp1_update_3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_batch:9.0:sp1_update_4:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_batch:9.1:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_net_pc:14:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_net_pc:15:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_net_pc:16:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_net_pc:16:update1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_net_pc:17:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_route_control:8.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_route_control:9.0:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_route_control:9.1:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:* | 1 | OR | 7.4 | |
cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:15:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:16:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:16:update1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:16:update2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:16:update3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:16:update4:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:17:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simatic_wincc:17:update1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:siemens:simaticpcs_7:*:*:*:*:*:*:*:* | 1 | OR | 8.2 | |
cpe:2.3:a:siemens:simaticpcs_7:*:*:*:*:*:*:*:* | 1 | OR | 9.0 | 9.1 |
cpe:2.3:a:siemens:simaticpcs_7:9.1:-:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:P/I:N/A:N
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 5
- Severity
- MEDIUM
- Exploitability Score
- 10
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- NONE
- Base Score
- 7.5
- Base Severity
- HIGH
- Exploitability Score
- 3.9
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-40359 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40359 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 15:43:38 | Added to TrackCVE | |||
2022-12-05 14:07:34 | 2021-11-09T12:15Z | 2021-11-09T12:15:09 | CVE Published Date | updated |
2022-12-05 14:07:34 | 2022-07-12T10:15:09 | CVE Modified Date | updated | |
2022-12-05 14:07:34 | Modified | Vulnerability Status | updated | |
2023-04-11 12:11:17 | 2023-04-11T10:15:10 | CVE Modified Date | updated |