First published: Wed Jun 12 2019(Updated: )
A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). An authenticated attacker could escalate privileges by sending specially crafted requests to the integrated webserver. The security vulnerability can be exploited by an attacker with network access to the device. Valid user credentials, but no user interaction are required. Successful exploitation compromises integrity and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic Mv420 Firmware | ||
Siemens Simatic Mv420 | ||
Siemens Simatic Mv440 Firmware | ||
Siemens Simatic Mv440 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10925 is a vulnerability found in SIMATIC MV400 family (All Versions < V7.0.6) that allows an authenticated attacker to escalate privileges by sending specially crafted requests to the integrated webserver.
CVE-2019-10925 has a severity rating of 7.1, which is considered high.
An attacker with network access to the device can exploit CVE-2019-10925 by sending specially crafted requests to the integrated webserver.
All versions of SIMATIC MV400 family below V7.0.6 are affected by CVE-2019-10925.
No, Siemens Simatic Mv420 is not affected by CVE-2019-10925.
No, Siemens Simatic Mv440 is not affected by CVE-2019-10925.
To fix CVE-2019-10925, users should upgrade their SIMATIC MV400 family devices to version V7.0.6 or higher.