- Description
- A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions >= V2.0 < V2.1). The web based management of affected devices does not properly validate user input, making it susceptible to command injection. This could allow an authenticated privileged remote attacker to execute arbitrary code with root privileges.
- Source
- productcert@siemens.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- productcert@siemens.com
- CWE-77
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:2.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A1F685FA-A737-4D3D-AF47-837D30EBD898"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:2.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CAD8CE67-41F5-4673-BC79-EF290971FF20"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]