First published: Tue Oct 10 2023(Updated: )
A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05.11), CP-8050 MASTER MODULE (All versions < CPCI85 V05.11). The web server of affected devices fails to properly sanitize user input for the /sicweb-ajax/tmproot/ endpoint. This could allow an authenticated remote attacker to traverse directories on the system and download arbitrary files. By exploring active session IDs, the vulnerability could potentially be leveraged to escalate privileges to the administrator role.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Cp-8050 Firmware | <05.11 | |
Siemens Cp-8050 | ||
Siemens Cp-8031 Firmware | <05.11 | |
Siemens Cp-8031 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-42796 is high, with a severity value of 8.8.
CP-8031 MASTER MODULE (All versions < CPCI85 V05.11) and CP-8050 MASTER MODULE (All versions < CPCI85 V05.11) are affected by CVE-2023-42796.
The vulnerability in CVE-2023-42796 is that the web server of affected devices fails to properly sanitize user input for the /sicweb-ajax/tmproot/ endpoint.
An authenticated user can exploit CVE-2023-42796 by submitting malicious input in the /sicweb-ajax/tmproot/ endpoint, bypassing input sanitization.
You can find more information about CVE-2023-42796 at the following reference: https://cert-portal.siemens.com/productcert/pdf/ssa-770890.pdf