SB2023051108 - Multiple vulnerabilities in Siemens SIMATIC Cloud Connect 7



SB2023051108 - Multiple vulnerabilities in Siemens SIMATIC Cloud Connect 7

Published: May 11, 2023

Security Bulletin ID SB2023051108
Severity
Medium
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 43% Low 57%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Use of Hard-coded Password (CVE-ID: CVE-2023-29103)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected device uses a hard-coded password to protect the diagnostic files. A remote user can gain access to protected data.


2) Missing Standardized Error Handling Mechanism (CVE-ID: CVE-2023-29105)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to missing standardized error handling mechanism while parsing a random (non-JSON) MQTT payload. A remote attacker can manipulate the communication between the MQTT broker and the affected device and perform a denial of service (DoS) attack.


3) Command Injection (CVE-ID: CVE-2023-28832)

The vulnerability allows a remote user to execute arbitrary commands on the target system.

The vulnerability exists due to improper input validation in the web based management. A remote administrator can pass specially crafted data to the application and execute arbitrary commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Path traversal (CVE-ID: CVE-2023-29104)

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the filename in the upload feature. A remote administrator can send a specially crafted HTTP request and overwrite arbitrary files on the system.


5) Information disclosure (CVE-ID: CVE-2023-29106)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the export endpoint is accessible via REST API without authentication. A remote attacker can gain unauthorized access to sensitive information on the system.


6) Insufficiently protected credentials (CVE-ID: CVE-2023-29107)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the export endpoint discloses some undocumented files. A remote attacker can gain access to additional information resources.


7) Path traversal (CVE-ID: CVE-2023-29128)

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the filename in the upload feature. A remote administrator can send a specially crafted HTTP request and write arbitrary files on the system.


Remediation

Install update from vendor's website.