First published: Tue Jul 09 2024(Updated: )
A vulnerability has been identified in SIMATIC STEP 7 Safety V18 (All versions < V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing user-controllable input. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application. This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC STEP 7 Safety | <V18 Update 2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32737 has been rated as a critical vulnerability due to its potential for arbitrary code execution.
CVE-2023-32737 allows attackers to exploit type confusion during the deserialization of user-controllable input in SIMATIC STEP 7 Safety.
To mitigate CVE-2023-32737, upgrade to SIMATIC STEP 7 Safety V18 Update 2 or later.
All versions of SIMATIC STEP 7 Safety prior to V18 Update 2 are vulnerable to CVE-2023-32737.
If your system is affected by CVE-2023-32737, you should prioritize applying the latest updates from Siemens to secure your application.