CVE-2020-7581 vulnerability in Siemens Products
Published on July 14, 2020
A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted. This could allow a local attacker with administrative privileges to execute code with SYSTEM level privileges.
Weakness Type
Unquoted Search Path or Element
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. If a malicious individual has access to the file system, it is possible to elevate privileges by inserting such a file as "C:\Program.exe" to be run by a privileged program making use of WinExec.
Products Associated with CVE-2020-7581
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2020-7581 are published in these products:
Affected Versions
Siemens Opcenter Execution Discrete:- Version All versions < V3.2 is affected.
- Version All versions < V3.2 is affected.
- Version All versions < V3.2 is affected.
- Version All versions < V3.3 is affected.
- Version All versions < V11.3 is affected.
- Version V8.0 is affected.
- Version All versions is affected.
- Version All versions < V3.0 SP1 is affected.
- Version All versions < V15.1 Update 5 is affected.
- Version All versions < V16 Update 2 is affected.
- Version All versions < V15.1 Update 4 is affected.
- Version All versions < V16 Update 1 is affected.
- Version All versions < V15.1 Update 3 is affected.
- Version All versions < V16 Update 1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.