{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/466044#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\nSiemens Totally Integrated Administrator (TIA) fails to properly set the module search path to be used by a privileged Node.js component, which can allow an unprivileged Windows user to run arbitrary code with SYSTEM privileges. The PCS neo administration console is reported to be affected as well.\r\n\r\n### Description\r\n\r\nSiemens TIA runs a privileged Node.js component. The Node.js server fails to properly set the module search path. Because of this, Node.js will look for modules in the `C:\\node_modules\\` directory when the server is started. Because unprivileged Windows users can create subdirectories off of the system root, a user can create this directory and place a specially-crafted `.js` file in it to achieve arbitrary code execution with SYSTEM privileges when the server starts.\r\n\r\n### Impact\r\nBy placing a specially-crafted JS file in the `C:\\node_modules\\` directory, an unprivileged user may be able to execute arbitrary code with SYSTEM privileges on a Windows system with the vulnerable Siemens TIA or PCS neo administration console software installed.\r\n\r\n### Solution\r\n#### Apply an update\r\nThis issue is addressed in TIA Administrator [V1.0 SP2 Upd2](https://support.industry.siemens.com/cs/ww/en/view/114358/). PCS neo administration console users should apply the mitigations described in [Industrial Security in SIMATIC PCS neo](https://support.industry.siemens.com/cs/ww/en/view/109771524).\r\n\r\nFor more details see Siemens Security Advisory [SSA-428051](https://cert-portal.siemens.com/productcert/pdf/ssa-428051.pdf).\r\n\r\n### Acknowledgements\r\nThis vulnerability was reported by Will Dormann of the CERT/CC.\r\n\r\nThis document was written by Will Dormann.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"},{"category":"other","text":"For details refer to Siemens Security Advisory SSA-428051","title":"Vendor statment from Siemens"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/466044"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-428051.pdf","summary":"https://cert-portal.siemens.com/productcert/pdf/ssa-428051.pdf"},{"url":"https://support.industry.siemens.com/cs/ww/en/view/109771524","summary":"https://support.industry.siemens.com/cs/ww/en/view/109771524"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-428051.pdf","summary":"Reference(s) from vendor \"Siemens\""}],"title":"Siemens Totally Integrated Automation Portal vulnerable to privilege escalation due to Node.js paths","tracking":{"current_release_date":"2021-02-09T17:45:23+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#466044","initial_release_date":"2021-02-09 15:09:41.370784+00:00","revision_history":[{"date":"2021-02-09T17:45:23+00:00","number":"1.20210209174523.4","summary":"Released on 2021-02-09T17:45:23+00:00"}],"status":"final","version":"1.20210209174523.4"}},"vulnerabilities":[{"title":"Siemens TIA is vulnerable to privilege escalation.","notes":[{"category":"summary","text":"Siemens TIA is vulnerable to privilege escalation"}],"cve":"CVE-2020-25238","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#466044"}],"product_status":{"known_affected":["CSAFPID-e92b9534-39db-11f1-8422-122e2785dc9f"]}}],"product_tree":{"branches":[{"category":"vendor","name":"Siemens","product":{"name":"Siemens Products","product_id":"CSAFPID-e92b9534-39db-11f1-8422-122e2785dc9f"}}]}}