CVE-2020-7586
Summary
| CVE | CVE-2020-7586 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-06-10 17:15:00 UTC |
| Updated | 2021-04-22 21:15:00 UTC |
| Description | A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC PDM (All versions < V9.2), SIMATIC STEP 7 V5.X (All versions < V5.6 SP2 HF3), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 HF2). A buffer overflow vulnerability could allow a local attacker to cause a Denial-of-Service situation. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise the availability of the system as well as to have access to confidential information. |
Risk And Classification
Problem Types: CWE-122
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Siemens | Simatic Pcs 7 | All | All | All | All |
| Application | Siemens | Simatic Pcs 7 | All | All | All | All |
| Application | Siemens | Simatic Process Device Manager | All | All | All | All |
| Application | Siemens | Simatic Process Device Manager | All | All | All | All |
| Application | Siemens | Simatic Step 7 | All | All | All | All |
| Application | Siemens | Simatic Step 7 | 5.6 | - | All | All |
| Application | Siemens | Simatic Step 7 | 5.6 | sp1 | All | All |
| Application | Siemens | Simatic Step 7 | 5.6 | sp2 | All | All |
| Application | Siemens | Simatic Step 7 | 5.6 | sp2_hotfix1 | All | All |
| Application | Siemens | Simatic Step 7 | All | All | All | All |
| Application | Siemens | Simatic Step 7 | 5.6 | - | All | All |
| Application | Siemens | Simatic Step 7 | 5.6 | sp1 | All | All |
| Application | Siemens | Simatic Step 7 | 5.6 | sp2 | All | All |
| Application | Siemens | Simatic Step 7 | 5.6 | sp2_hotfix1 | All | All |
| Application | Siemens | Sinamics Starter | All | All | All | All |
| Application | Siemens | Sinamics Starter | 5.4 | - | All | All |
| Application | Siemens | Sinamics Starter | All | All | All | All |
| Application | Siemens | Sinamics Starter | 5.4 | - | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| cert-portal.siemens.com/productcert/pdf/ssa-689942.pdf | MISC | cert-portal.siemens.com | Vendor Advisory |
| Siemens SIMATIC, SINAMICS (Update A) | CISA | MISC | www.us-cert.gov | Third Party Advisory, US Government Resource |
| Siemens SIMATIC, SINAMICS (Update B) | CISA | CONFIRM | us-cert.cisa.gov | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.