First published: Fri Aug 09 2013(Updated: )
The client application in Siemens COMOS before 9.1 Update 458, 9.2 before 9.2.0.6.37, and 10.0 before 10.0.3.0.19 allows local users to gain privileges and bypass intended database-operation restrictions by leveraging COMOS project access.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
COMOS | =9.1 | |
COMOS | =9.2 | |
COMOS | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4943 has a medium severity level due to its potential to allow local users to elevate privileges.
To fix CVE-2013-4943, users should upgrade to Siemens COMOS versions 9.1 Update 458, 9.2.0.6.37, or 10.0.3.0.19 or later.
CVE-2013-4943 affects Siemens COMOS versions 9.1 before Update 458, 9.2 before 9.2.0.6.37, and 10.0 before 10.0.3.0.19.
CVE-2013-4943 is a local privilege escalation vulnerability and cannot be exploited remotely.
Local users of Siemens COMOS prior to the specified updates are at risk of being affected by CVE-2013-4943.