As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
1. EXECUTIVE SUMMARY
- CVSS v3 8.1
- ATTENTION: Exploitable locally
- Vendor: Siemens
- Equipment: SIMOTION Tools
- Vulnerability: Improper Check for Unusual or Exceptional Conditions
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code with SYSTEM privileges when a legitimate user installs an application that uses the affected setup component.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
- SIMATIC Technology Package TPCamGen (6ES7823-0FE30-1AA0): All versions
- SIMOTION OA MIIF (6AU1820-3DA20-0AB0): All versions
- SIMOTION OACAMGEN (6AU1820-3EA20-0AB0): All versions
- SIMOTION OALECO (6AU1820-3HA20-0AB0): All versions
- SIMOTION OAVIBX (6AU1820-3CA20-0AB0): All versions
3.2 VULNERABILITY OVERVIEW
3.2.1 IMPROPER CHECK FOR UNUSUAL OR EXCEPTIONAL CONDITIONS CWE-754
Nullsoft Scriptable Install System (NSIS) before 3.11 on Windows allows local users to escalate privileges to SYSTEM during an installation, because the temporary plugins directory is created under %WINDIR%\temp and unprivileged users can place a crafted executable file by winning a race condition. This occurs because EW_CREATEDIR does not always set the CreateRestrictedDirectory error flag.
CVE-2025-43715 has been assi
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: