A vulnerability has been identified in TIA Portal V14 (All versions), TIA Portal V15 (All versions < V15.1 Update 7), TIA Portal V16 (All versions < V16 Update 6), TIA Portal V17 (All versions < V17 Update 4). Changing the contents of a configuration file could allow an attacker to execute arbitrary code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. No user interaction is required. At the time of advisory publication no public exploitation of this security vulnerability was known.
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/pdf/ssa-629512.pdf | Vendor Advisory |
| https://cert-portal.siemens.com/productcert/pdf/ssa-629512.pdf | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:20
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-629512.pdf - Vendor Advisory |
10 Aug 2022, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | A vulnerability has been identified in TIA Portal V14 (All versions), TIA Portal V15 (All versions < V15.1 Update 7), TIA Portal V16 (All versions < V16 Update 6), TIA Portal V17 (All versions < V17 Update 4). Changing the contents of a configuration file could allow an attacker to execute arbitrary code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. No user interaction is required. At the time of advisory publication no public exploitation of this security vulnerability was known. |
10 Aug 2022, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | A vulnerability has been identified in TIA Portal V14 (All versions), TIA Portal V15 (All versions < V15.1 Update 7), TIA Portal V16 (All versions < V16 Update 6), TIA Portal V17 (All versions < V17 Update 4). Changing the contents of a configuration file could allow an attacker to execute arbitrary code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. No user interaction is required. At the time of advisory publication no public exploitation of this security vulnerability was known. |
14 Jun 2022, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | A vulnerability has been identified in TIA Portal V14 (All versions), TIA Portal V15 (All versions < V15.1 Update 7), TIA Portal V16 (All versions), TIA Portal V17 (All versions < V17 Update 4). Changing the contents of a configuration file could allow an attacker to execute arbitrary code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. No user interaction is required. At the time of advisory publication no public exploitation of this security vulnerability was known. |
20 May 2022, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | A vulnerability has been identified in TIA Portal V14 (All versions), TIA Portal V15 (All versions < V15.1 Update 7), TIA Portal V16 (All versions), TIA Portal V17 (All versions). Changing the contents of a configuration file could allow an attacker to execute arbitrary code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. No user interaction is required. At the time of advisory publication no public exploitation of this security vulnerability was known. |
20 May 2022, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | A vulnerability has been identified in TIA Portal V14 (All versions), TIA Portal V15 (All versions < V15.1 Update 7), TIA Portal V16 (All versions), TIA Portal V17 (All versions). Changing the contents of a configuration file could allow an attacker to execute arbitrary code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. No user interaction is required. At the time of advisory publication no public exploitation of this security vulnerability was known. |
24 Apr 2022, 01:56
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:siemens:totally_integrated_automation_portal:15.1:update_1:*:*:*:*:*:* cpe:2.3:a:siemens:totally_integrated_automation_portal:16:*:*:*:*:*:*:* cpe:2.3:a:siemens:totally_integrated_automation_portal:15.1:-:*:*:*:*:*:* cpe:2.3:a:siemens:totally_integrated_automation_portal:15.1:update_2:*:*:*:*:*:* |
14 Dec 2021, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | A vulnerability has been identified in TIA Portal V14 (All versions), TIA Portal V15 (All versions), TIA Portal V16 (All versions), TIA Portal V17 (All versions). Changing the contents of a configuration file could allow an attacker to execute arbitrary code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. No user interaction is required. At the time of advisory publication no public exploitation of this security vulnerability was known. |
14 Dec 2021, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | A vulnerability has been identified in TIA Portal V14 (All versions), TIA Portal V15 (All versions), TIA Portal V16 (All versions), TIA Portal V17 (All versions). Changing the contents of a configuration file could allow an attacker to execute arbitrary code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. No user interaction is required. At the time of advisory publication no public exploitation of this security vulnerability was known. |
Information
Published : 2020-01-16 16:15
Updated : 2024-11-21 04:20
NVD link : CVE-2019-10934
Mitre link : CVE-2019-10934
CVE.ORG link : CVE-2019-10934
JSON object : View
Products Affected
siemens
- totally_integrated_automation_portal
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
