First published: Tue Jul 09 2024(Updated: )
A vulnerability has been identified in SIMATIC PCS neo V4.0 (All versions), SIMATIC STEP 7 V16 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions < V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing user-controllable input. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application. This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC Process Control SYSTEM Neo | <=4.0 | |
SIMATIC STEP 7 | <=16<=17>=18<V18 Update 2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45147 has been assessed with a high severity due to improper handling of the .NET BinaryFormatter.
To mitigate CVE-2022-45147, update affected software components to the latest versions provided by Siemens.
CVE-2022-45147 affects all versions of SIMATIC PCS neo V4.0 and certain versions of SIMATIC STEP 7 up to V18 Update 2.
Yes, CVE-2022-45147 could potentially allow remote code execution if exploited.
CVE-2022-45147 poses a significant risk to industrial control systems by potentially allowing unauthorized control over the system.