9/28/2023 0 Comments Siemens star ccm+![]() Siemens has identified the following specific workarounds and mitigations users can apply to reduce risk: ![]() CRITICAL INFRASTRUCTURE SECTORS: Critical ManufacturingĬraig Carr, from University of Glasgow, reported this vulnerability to Siemens.A CVSS v3 base score of 7.8 has been calculated the CVSS vector string is ( AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). This could allow a local attacker with an unprivileged account to override or modify the service executables and subsequently gain elevated privileges.ĬVE-2022-43517 has been assigned to this vulnerability. ![]() The affected application improperly assigns file permissions to installation folders. The following versions of Siemens Simcenter STAR-CCM+, a computational fluid dynamics software, are affected:ģ.2.1 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 ![]() Successful exploitation of this vulnerability could allow a local attacker with an unprivileged account to override or modify the service executable and subsequently gain elevated privileges. Vulnerability: Incorrect Permission Assignment for Critical Resource. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |