First published: Tue Jun 13 2023(Updated: )
A vulnerability has been identified in Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions). The know-how protection feature in affected products does not properly update the encryption of existing program blocks when a project file is updated. This could allow attackers with access to the project file to recover previous - yet unprotected - versions of the project without the knowledge of the know-how protection password.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Totally Integrated Automation Portal | =14.0 | |
Siemens Totally Integrated Automation Portal | =15 | |
Siemens Totally Integrated Automation Portal | =15.1 | |
Siemens Totally Integrated Automation Portal | =16 | |
Siemens Totally Integrated Automation Portal | =17 | |
Siemens Totally Integrated Automation Portal | =18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-30757 is medium, with a severity value of 5.5.
CVE-2023-30757 affects Totally Integrated Automation Portal (TIA Portal) V14, V15, and V15.1.
The Common Weakness Enumeration (CWE) ID for CVE-2023-30757 is CWE-693.
To fix the vulnerability in Totally Integrated Automation Portal (TIA Portal), refer to the recommendations provided in the official Siemens security advisory.
More information about CVE-2023-30757 can be found in the official Siemens security advisory at the provided reference link.