CVE-2018-11454

moderate-risk
Published 2018-08-07

A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V10, V11, V12 (All versions), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V13 (All versions < V13 SP2 Update 2), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V14 (All versions < V14 SP1 Update 6), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V15 (All versions < V15 Update 2). Improper file permissions in the default installation of TIA Portal may allow an attacker with local file system access to manipulate resources which may be transferred to devices and executed there by a different user. No special privileges are required, but the victim needs to transfer the manipulated files to a device. Execution is caused on the target device rather than on the PG device.

Do I need to act?

-
0.06% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.6/10 High
LOCAL / LOW complexity

Affected Products (13)

Simatic Step 7 \(Tia Portal\)
Simatic Step 7 \(Tia Portal\)
Simatic Step 7 \(Tia Portal\)
Simatic Step 7 \(Tia Portal\)
Simatic Step 7 \(Tia Portal\)
Simatic Step 7 \(Tia Portal\)
Simatic Step 7 \(Tia Portal\)
Simatic Wincc \(Tia Portal\)
Simatic Wincc \(Tia Portal\)
Simatic Wincc \(Tia Portal\)
Simatic Wincc \(Tia Portal\)
Simatic Wincc \(Tia Portal\)
Simatic Wincc \(Tia Portal\)

Affected Vendors

43
/ 100
moderate-risk
Severity 26/34 · High
Exploitability 0/34 · Minimal
Exposure 17/34 · Moderate