SideWinder APT Group aka Rattlesnake Targeting Pakistan – Active IOCs
October 22, 2024Multiple Trend Micro Products Vulnerabilities
October 23, 2024SideWinder APT Group aka Rattlesnake Targeting Pakistan – Active IOCs
October 22, 2024Multiple Trend Micro Products Vulnerabilities
October 23, 2024Severity
Medium
Analysis Summary
CVE-2024-46886 CVSS:4.7
The web server of affected devices does not properly validate input that is used for a user redirection. This could allow an attacker to make the server redirect the legitimate user to an attacker-chosen URL. For a successful exploit, the legitimate user must actively click on an attacker-crafted link.
CVE-2024-46887 CVSS:5.3
The web server of affected devices do not properly authenticate user request to the '/ClientArea/RuntimeInfoData.mwsl' endpoint. This could allow an unauthenticated remote attacker to gain knowledge about current actual and configured maximum cycle times as well as about configured maximum communication load.
CVE-2024-47046 CVSS:7.8
A vulnerability has been identified in Simcenter Nastran 2306 (All versions), Simcenter Nastran 2312 (All versions), Simcenter Nastran 2406 (All versions < V2406.5000). The affected application is vulnerable to memory corruption while parsing specially crafted BDF files. This could allow an attacker to execute code in the context of the current process.
CVE-2024-47194 CVSS:7.3
A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). vish2.exe in affected applications allows a specific DLL file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vish2.exe from a user-writable directory.
CVE-2024-47195 CVSS:7.3
A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). gdb.exe in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch gdb.exe from a user-writable directory.
CVE-2024-47196 CVSS:7.3
A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). vsimk.exe in affected applications allows a specific tcl file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vsimk.exe from a user-writable directory.
CVE-2024-47553 CVSS:9.9
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate user input to the ```ssmctl-client``` command. This could allow an authenticated, lowly privileged remote attacker to execute arbitrary code with root privileges on the underlying OS.
CVE-2024-47562 CVSS:8.8
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly neutralize special elements in user input to the ```ssmctl-client``` command. This could allow an authenticated, lowly privileged local attacker to execute privileged commands in the underlying OS.
CVE-2024-47563 CVSS:5.3
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate a file path that is supplied to an endpoint intended to create CSR files. This could allow an unauthenticated remote attacker to create files in writable directories outside the intended location and thus compromise integrity of files in those writable directories.
CVE-2024-47565 CVSS:4.3
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate that user input complies with a list of allowed values. This could allow an authenticated remote attacker to compromise the integrity of the configuration of the affected application.
Impact
- Gain Access
- Code Execution
- Privilege Escalation
- Information Disclosure
Indicators of Compromise
CVE
- CVE-2024-46886
- CVE-2024-46887
- CVE-2024-47046
- CVE-2024-47194
- CVE-2024-47195
- CVE-2024-47196
- CVE-2024-47553
- CVE-2024-47562
- CVE-2024-47563
- CVE-2024-47565
Affected Vendors
Affected Products
- Siemens Simcenter Nastran 2306
- Siemens Simcenter Nastran 2312
- Siemens Simcenter Nastran 2406
- Siemens SIMATIC Drive Controller CPU 1504D TF
- Siemens SIMATIC Drive Controller CPU 1507D TF
- Siemens SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)
- Siemens SIMATIC S7-1200 CPU 1211C AC/DC/Rly
- Siemens ModelSim
- Siemens Questa
- Siemens SINEC Security Monitor
Remediation
Refer to Siemens Security Advisory for patch, upgrade, or suggested workaround information.