First published: Sat Mar 07 2015(Updated: )
Untrusted search path vulnerability in Siemens SIMATIC ProSave before 13 SP1; SIMATIC CFC before 8.0 SP4 Upd9 and 8.1 before Upd1; SIMATIC STEP 7 before 5.5 SP1 HF2, 5.5 SP2 before HF7, 5.5 SP3, and 5.5 SP4 before HF4; SIMOTION Scout before 4.4; and STARTER before 4.4 HF3 allows local users to gain privileges via a Trojan horse application file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens STARTER | <=4.4 | |
Siemens SIMATIC ProSave | =13.0 | |
Siemens SIMOTION SCOUT TIA | <=4.3 | |
Siemens SIMATIC CFC | <=8.0 | |
Siemens SIMATIC CFC | =8.1 | |
SIMATIC STEP 7 | <=5.5 | |
SIMATIC STEP 7 | =5.5-sp2 | |
SIMATIC STEP 7 | =5.5-sp3 | |
SIMATIC STEP 7 | =5.5-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1594 has been classified as a moderate severity vulnerability.
To mitigate CVE-2015-1594, update to the latest versions of the affected Siemens software as recommended by Siemens.
CVE-2015-1594 affects multiple Siemens software including SIMATIC ProSave, SIMATIC CFC, SIMATIC STEP 7, SIMOTION Scout, and STARTER.
Yes, CVE-2015-1594 allows local users to exploit the vulnerability due to an untrusted search path issue.
Yes, CVE-2015-1594 specifically affects certain versions of Siemens software prior to their respective updates.