Vulnerability Description
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions). The vulnerability could lead to an attacker reading and modifying the device configuration and obtain project files from affected devices. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 135/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Logo\! 8 Bm Firmware | All versions |
| Siemens | Logo\! 8 Bm | - |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-817401.pdfVendor Advisory
- https://www.us-cert.gov/ics/advisories/icsa-20-161-03Third Party AdvisoryUS Government Resource
- https://cert-portal.siemens.com/productcert/pdf/ssa-817401.pdfVendor Advisory
- https://www.us-cert.gov/ics/advisories/icsa-20-161-03Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2020-7589?
CVE-2020-7589 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions). The vulnerability could lead to an attacker reading and modifying the device configuration and obtain project ...
How severe is CVE-2020-7589?
CVE-2020-7589 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-7589?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Logo\! 8 Bm Firmware, Siemens Logo\! 8 Bm.