SIMATIC STEP 7/PCS neo All V .NET BinaryFormatter Deserialization RCE
CVE-2022-45147 Published on July 9, 2024
A vulnerability has been identified in SIMATIC PCS neo V4.0 (All versions), SIMATIC STEP 7 V16 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions < V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing user-controllable input. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application. This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300.
Weakness Type
What is a Marshaling, Unmarshaling Vulnerability?
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
CVE-2022-45147 has been classified to as a Marshaling, Unmarshaling vulnerability or weakness.
Products Associated with CVE-2022-45147
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-45147 are published in Siemens Simatic Step 7:
Affected Versions
Siemens SIMATIC PCS neo V4.0:- Before * is affected.
- Before * is affected.
- Before * is affected.
- Before V18 Update 2 is affected.
- Version 4.0 and below 5.0 is affected.
- Version 16 and below 17 is affected.
- Version 17 and below 18 is affected.
- Version 18 and below 18_update_2 is affected.
- Version 16 and below 17 is affected.
- Version 17 and below 18 is affected.
- Version 18 and below 18_update_2 is affected.
- Version 16 and below 17 is affected.
- Version 17 and below 18 is affected.
- Version 18 and below 18_update_2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.