First published: Tue Apr 11 2023(Updated: )
A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). Affected devices are vulnerable to command injection via the web server port 443/tcp, if the parameter “Remote Operation” is enabled. The parameter is disabled by default. The vulnerability could allow an unauthenticated remote attacker to perform arbitrary code execution on the device.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Cp-8031 Firmware | <cpci85_v05 | |
Siemens Cp-8031 | ||
Siemens Cp-8050 Firmware | <cpci85_v05 | |
Siemens Cp-8050 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-28489 is critical with a CVSS score of 9.8.
CP-8031 MASTER MODULE (All versions < CPCI85 V05) and CP-8050 MASTER MODULE (All versions < CPCI85 V05) are affected.
The vulnerability in CVE-2023-28489 is command injection via the web server port 443/tcp if the parameter "Remote Operation" is enabled.
You can fix CVE-2023-28489 by applying the latest firmware update provided by Siemens.
Siemens Cp-8031 and Cp-8050 devices are vulnerable to CVE-2023-28489 if they have versions older than CPCI85 V05.