First published: Wed Jun 10 2020(Updated: )
A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC PDM (All versions < V9.2), SIMATIC STEP 7 V5.X (All versions < V5.6 SP2 HF3), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 HF2). A buffer overflow vulnerability could allow a local attacker to cause a Denial-of-Service situation. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise the availability of the system as well as to have access to confidential information.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
SIEMENS SIMATIC PCS 7 | ||
Siemens Simatic Process Device Manager | ||
Siemens SIMATIC STEP 7 | <5.6 | |
Siemens SIMATIC STEP 7 | =5.6 | |
Siemens SIMATIC STEP 7 | =5.6-sp1 | |
Siemens SIMATIC STEP 7 | =5.6-sp2 | |
Siemens SIMATIC STEP 7 | =5.6-sp2_hotfix1 | |
Siemens Sinamics Starter | <5.4 | |
Siemens Sinamics Starter | =5.4 | |
Siemens SIMATIC PCS 7: All versions including v8.2 and prior | ||
Siemens SIMATIC PCS 7 v9.0 SP3 | <9.0 | 9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-7586 is rated as high.
SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC PDM (All versions < V9.2), SIMATIC STEP 7 V5.X (All versions < V5.6 SP2 HF3), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 HF2).
Siemens has released security updates and recommends updating to the latest version of affected software.
The CWE IDs for CVE-2020-7586 are 119, 122, and 787.
You can find more information about CVE-2020-7586 in the following references: [Siemens ProductCERT](https://cert-portal.siemens.com/productcert/pdf/ssa-689942.pdf), [US-CERT Advisory](https://us-cert.cisa.gov/ics/advisories/icsa-20-161-05), [US-CERT ICS Advisory](https://www.us-cert.gov/ics/advisories/icsa-20-161-05).