Siemens SINUMERIK 828D/SINUMERIK 840D sl Web Server Network Request access control
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.7 | $0-$5k | 0.00 |
A vulnerability, which was classified as critical, was found in Siemens SINUMERIK 828D and SINUMERIK 840D sl (affected version unknown). Affected is an unknown functionality of the component Web Server. The manipulation as part of a Network Request leads to a access control vulnerability. CWE is classifying the issue as CWE-264. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
A vulnerability has been identified in SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). The integrated web server on port 4842/tcp of the affected products could allow a remote attacker to execute code with privileged permissions on the system by sending specially crafted network requests to port 4842/tcp. Please note that this vulnerability is only exploitable if port 4842/tcp is manually opened in the firewall configuration of network port X130. The security vulnerability could be exploited by an attacker with network access to the affected devices on port 4842/tcp. Successful exploitation requires no privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the web server. At the time of advisory publication no public exploitation of this security vulnerability was known.
The bug was discovered 12/12/2018. The weakness was shared 12/12/2018 (Website). The advisory is shared for download at cert-portal.siemens.com. This vulnerability is traded as CVE-2018-11457 since 05/25/2018. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1068.
Upgrading eliminates this vulnerability.It is possible to mitigate the weakness by firewalling tcp/4842. The best possible mitigation is suggested to be upgrading to the latest version.
The entries 127886, 127887, 127888 and 127889 are related to this item.
Product
Vendor
Name
License
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.8VulDB Meta Temp Score: 6.7
VulDB Base Score: 5.6
VulDB Temp Score: 5.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 8.1
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Firewalling: 🔍
Timeline
05/25/2018 🔍12/11/2018 🔍
12/12/2018 🔍
12/12/2018 🔍
12/12/2018 🔍
12/13/2018 🔍
06/18/2023 🔍
Sources
Vendor: siemens.comAdvisory: ssa-170881
Status: Not defined
Confirmation: 🔍
CVE: CVE-2018-11457 (🔍)
SecurityFocus: 106185 - Siemens SINUMERIK Controllers Multiple Security Vulnerabilities
See also: 🔍
Entry
Created: 12/13/2018 08:44Updated: 06/18/2023 13:19
Changes: 12/13/2018 08:44 (60), 04/20/2020 12:50 (4), 06/18/2023 13:19 (4)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.