4.6
CVSSv2

CVE-2019-10915

Published: 11/07/2019 Updated: 02/10/2020
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 410
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A vulnerability has been identified in TIA Administrator (All versions < V1.0 SP1 Upd1). The integrated configuration web application (TIA Administrator) allows to execute certain application commands without proper authentication. The vulnerability could be exploited by an attacker with local access to the affected system. Successful exploitation requires no privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

siemens tia administrator 1.0

siemens sinetplan 2.0

Recent Articles

Remember Stuxnet? You'll endure its hated-by-critics sequel if you don't patch your holey Siemens industrial kit
The Register • Shaun Nichols in San Francisco • 10 Jul 2019

Power, infrastructure, factory gear can be hijacked without any password check at all Just a reminder: We're still bad at securing industrial controllers

Industrial control software vulnerabilities, which would be perfect for next-gen Stuxnet-style worms to exploit, are as prevalent as ever, apparently. A report out this week from Tenable outlined a series of CVE-listed security holes in the products of four of the largest industrial control system (ICS) makers, including Siemens, whose controllers at Iranian nuclear enrichment plants were the primary target of Stuxnet. Developed chiefly by America and Israel, Stuxnet worked by infecting Windows ...