6.4
MEDIUM
CVE-2016-7165
Siemens Unquoted Service Path Privilege Escalation Vulnerability
Description

A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC IT Production Suite (All versions < V7.0 SP1 HFX 2), SIMATIC NET PC-Software (All versions < V14), SIMATIC PCS 7 V7.1 (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 V5.X (All versions < V5.5 SP4 HF11), SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced (All versions < V14), SIMATIC WinCC (TIA Portal) Professional V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) Professional V14 (All versions < V14 SP1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1), SIMATIC WinCC V7.0 SP2 and earlier versions (All versions < V7.0 SP2 Upd 12), SIMATIC WinCC V7.0 SP3 (All versions < V7.0 SP3 Upd 8), SIMATIC WinCC V7.2 (All versions < V7.2 Upd 14), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 11), SIMATIC WinCC V7.4 (All versions < V7.4 SP1), SIMIT V9.0 (All versions < V9.0 SP1), SINEMA Remote Connect Client (All versions < V1.0 SP3), SINEMA Server (All versions < V13 SP2), SOFTNET Security Client V5.0 (All versions), Security Configuration Tool (SCT) (All versions < V4.3 HF1), TeleControl Server Basic (All versions < V3.0 SP2), WinAC RTX 2010 SP2 (All versions), WinAC RTX F 2010 SP2 (All versions). Unquoted service paths could allow local Microsoft Windows operating system users to escalate their privileges if the affected products are not installed under their default path ("C:\Program Files\*" or the localized equivalent).

INFO

Published Date :

Nov. 15, 2016, 7:30 p.m.

Last Modified :

Nov. 21, 2024, 2:57 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

0.5
Affected Products

The following products are affected by CVE-2016-7165 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Siemens simatic_pcs7
2 Siemens simatic_wincc
3 Siemens simatic_step_7_\(tia_portal\)
4 Siemens simatic_wincc_\(tia_portal\)
5 Siemens simatic_pcs_7
6 Siemens simatic_wincc_runtime
7 Siemens simatic_step_7
8 Siemens simit
9 Siemens sinema_server
10 Siemens sinema_remote_connect
11 Siemens simatic_net_pc_software
12 Siemens simatic_it_production_suite
13 Siemens primary_setup_tool
14 Siemens security_configuration_tool
15 Siemens simatic_winac_rtx_2010
16 Siemens simatic_winac_rtx_f_2010
17 Siemens softnet_security_client
18 Siemens telecontrol_basic
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2016-7165.

URL Resource
http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html Third Party Advisory
http://www.securityfocus.com/bid/94158 Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf
https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02 Third Party Advisory US Government Resource
http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html Third Party Advisory
http://www.securityfocus.com/bid/94158 Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf
https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02 Third Party Advisory US Government Resource

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2016-7165 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2016-7165 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html
    Added Reference http://www.securityfocus.com/bid/94158
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf
    Added Reference https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Jun. 15, 2018

    Action Type Old Value New Value
    Changed Description A vulnerability has been identified in Primary Setup Tool (PST), SIMATIC IT Production Suite, SIMATIC NET PC-Software, SIMATIC PCS 7 V7.1, SIMATIC PCS 7 V8.0, SIMATIC PCS 7 V8.1, SIMATIC PCS 7 V8.2, SIMATIC STEP 7 (TIA Portal) V13, SIMATIC STEP 7 V5.X, SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced, SIMATIC WinCC (TIA Portal) Professional V13, SIMATIC WinCC (TIA Portal) Professional V14, SIMATIC WinCC Runtime Professional V13, SIMATIC WinCC Runtime Professional V14, SIMATIC WinCC V7.0 SP2 and earlier versions, SIMATIC WinCC V7.0 SP3, SIMATIC WinCC V7.2, SIMATIC WinCC V7.3, SIMATIC WinCC V7.4, SIMIT V9.0, SINEMA Remote Connect Client, SINEMA Server, SOFTNET Security Client V5.0, Security Configuration Tool (SCT), TeleControl Server Basic, WinAC RTX 2010 SP2, WinAC RTX F 2010 SP2. Unquoted service paths could allow local Microsoft Windows operating system users to escalate their privileges if the affected products are not installed under their default path ("C:\Program Files\*" or the localized equivalent). A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC IT Production Suite (All versions < V7.0 SP1 HFX 2), SIMATIC NET PC-Software (All versions < V14), SIMATIC PCS 7 V7.1 (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 V5.X (All versions < V5.5 SP4 HF11), SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced (All versions < V14), SIMATIC WinCC (TIA Portal) Professional V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) Professional V14 (All versions < V14 SP1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1), SIMATIC WinCC V7.0 SP2 and earlier versions (All versions < V7.0 SP2 Upd 12), SIMATIC WinCC V7.0 SP3 (All versions < V7.0 SP3 Upd 8), SIMATIC WinCC V7.2 (All versions < V7.2 Upd 14), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 11), SIMATIC WinCC V7.4 (All versions < V7.4 SP1), SIMIT V9.0 (All versions < V9.0 SP1), SINEMA Remote Connect Client (All versions < V1.0 SP3), SINEMA Server (All versions < V13 SP2), SOFTNET Security Client V5.0 (All versions), Security Configuration Tool (SCT) (All versions < V4.3 HF1), TeleControl Server Basic (All versions < V3.0 SP2), WinAC RTX 2010 SP2 (All versions), WinAC RTX F 2010 SP2 (All versions). Unquoted service paths could allow local Microsoft Windows operating system users to escalate their privileges if the affected products are not installed under their default path ("C:\Program Files\*" or the localized equivalent).
    Removed Reference https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-701708.pdf [No Types Assigned]
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf [No Types Assigned]
  • CVE Modified by [email protected]

    Jan. 19, 2018

    Action Type Old Value New Value
    Changed Description Unquoted Windows search path vulnerability in Siemens SIMATIC WinCC V7.0 SP2 before Upd 12, V7.0 SP3 before Upd 8, V7.2 before Upd 14, V7.3 before Upd 11, and V7.4 before SP1; SIMATIC STEP 7 V5.x before V5.5 SP4 HF11; SIMATIC PCS 7 through V8.2; SIMATIC WinCC Runtime Professional V13 before SP2 and V14 before SP1; SIMATIC WinCC (TIA Portal) Professional V13 before SP2 and V14 before SP1; SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced before 14; SIMATIC STEP 7 (TIA Portal) V13 before SP2; SIMATIC NET PC-Software before V14; SINEMA Remote Connect Client; SINEMA Server before V13 SP2; SIMATIC WinAC RTX 2010 SP2; SIMATIC WinAC RTX F 2010 SP2; SIMATIC IT Production Suite before V7.0 SP1 HFX 2; TeleControl Server Basic before 3.0 SP2; SOFTNET Security Client 5.0; SIMIT before V9.0 SP1; Security Configuration Tool (SCT) before V4.3 HF1; and Primary Setup Tool (PST) before V4.2 HF1, when the installation does not use the %PROGRAMFILES% directory, might allow local users to gain privileges via a Trojan horse executable file. A vulnerability has been identified in Primary Setup Tool (PST), SIMATIC IT Production Suite, SIMATIC NET PC-Software, SIMATIC PCS 7 V7.1, SIMATIC PCS 7 V8.0, SIMATIC PCS 7 V8.1, SIMATIC PCS 7 V8.2, SIMATIC STEP 7 (TIA Portal) V13, SIMATIC STEP 7 V5.X, SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced, SIMATIC WinCC (TIA Portal) Professional V13, SIMATIC WinCC (TIA Portal) Professional V14, SIMATIC WinCC Runtime Professional V13, SIMATIC WinCC Runtime Professional V14, SIMATIC WinCC V7.0 SP2 and earlier versions, SIMATIC WinCC V7.0 SP3, SIMATIC WinCC V7.2, SIMATIC WinCC V7.3, SIMATIC WinCC V7.4, SIMIT V9.0, SINEMA Remote Connect Client, SINEMA Server, SOFTNET Security Client V5.0, Security Configuration Tool (SCT), TeleControl Server Basic, WinAC RTX 2010 SP2, WinAC RTX F 2010 SP2. Unquoted service paths could allow local Microsoft Windows operating system users to escalate their privileges if the affected products are not installed under their default path ("C:\Program Files\*" or the localized equivalent).
    Removed Reference http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-701708.pdf [Vendor Advisory]
    Added Reference https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-701708.pdf [No Types Assigned]
  • CVE Modified by [email protected]

    Dec. 30, 2017

    Action Type Old Value New Value
    Changed Description Unquoted Windows search path vulnerability in Siemens SIMATIC WinCC V7.0 SP2 before Upd 12, V7.0 SP3 before Upd 8, V7.2 before Upd 14, V7.3 before Upd 11 and V7.4 before SP1; SIMATIC STEP 7 V5.x before V5.5 SP4 HF11; SIMATIC PCS 7 through V8.2; SIMATIC WinCC Runtime Professional V13 before SP2 and V14 before SP1; SIMATIC WinCC (TIA Portal) Professional V13 before SP2 and V14 before SP1; SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced before 14; SIMATIC STEP 7 (TIA Portal) V13 before SP2; SIMATIC NET PC-Software before V14; SINEMA Remote Connect Client; SINEMA Server before V13 SP2; SIMATIC WinAC RTX 2010 SP2; SIMATIC WinAC RTX F 2010 SP2; SIMATIC IT Production Suite before V7.0 SP1 HFX 2; TeleControl Server Basic before 3.0 SP2; SOFTNET Security Client 5.0; SIMIT V9.0 before SP1; Security Configuration Tool (SCT) before V4.3 HF1; and Primary Setup Tool (PST), when the installation does not use the %PROGRAMFILES% directory, might allow local users to gain privileges via a Trojan horse executable file. Unquoted Windows search path vulnerability in Siemens SIMATIC WinCC V7.0 SP2 before Upd 12, V7.0 SP3 before Upd 8, V7.2 before Upd 14, V7.3 before Upd 11, and V7.4 before SP1; SIMATIC STEP 7 V5.x before V5.5 SP4 HF11; SIMATIC PCS 7 through V8.2; SIMATIC WinCC Runtime Professional V13 before SP2 and V14 before SP1; SIMATIC WinCC (TIA Portal) Professional V13 before SP2 and V14 before SP1; SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced before 14; SIMATIC STEP 7 (TIA Portal) V13 before SP2; SIMATIC NET PC-Software before V14; SINEMA Remote Connect Client; SINEMA Server before V13 SP2; SIMATIC WinAC RTX 2010 SP2; SIMATIC WinAC RTX F 2010 SP2; SIMATIC IT Production Suite before V7.0 SP1 HFX 2; TeleControl Server Basic before 3.0 SP2; SOFTNET Security Client 5.0; SIMIT before V9.0 SP1; Security Configuration Tool (SCT) before V4.3 HF1; and Primary Setup Tool (PST) before V4.2 HF1, when the installation does not use the %PROGRAMFILES% directory, might allow local users to gain privileges via a Trojan horse executable file.
  • CVE Modified by [email protected]

    May. 09, 2017

    Action Type Old Value New Value
    Changed Description Unquoted Windows search path vulnerability in Siemens SIMATIC WinCC before 7.0 SP2 Upd 12, 7.0 SP3 before Upd 8, and 7.2 through 7.4; SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced before 14; SIMATIC WinCC Runtime Professional; SIMATIC WinCC (TIA Portal) Professional; SIMATIC STEP 7 5.x; SIMATIC STEP 7 (TIA Portal) before 14; SIMATIC NET PC-Software before 14; TeleControl Server Basic before 3.0 SP2; SINEMA Server before 13 SP2; SIMATIC PCS 7 through 8.2; SINEMA Remote Connect Client; SIMATIC WinAC RTX 2010 SP2; SIMATIC WinAC RTX F 2010 SP2; SIMATIC IT Production Suite; SOFTNET Security Client 5.0; SIMIT 9.0; Security Configuration Tool (SCT); and Primary Setup Tool (PST), when the installation does not use the %PROGRAMFILES% directory, might allow local users to gain privileges via a Trojan horse executable file. Unquoted Windows search path vulnerability in Siemens SIMATIC WinCC V7.0 SP2 before Upd 12, V7.0 SP3 before Upd 8, V7.2 before Upd 14, V7.3 before Upd 11 and V7.4 before SP1; SIMATIC STEP 7 V5.x before V5.5 SP4 HF11; SIMATIC PCS 7 through V8.2; SIMATIC WinCC Runtime Professional V13 before SP2 and V14 before SP1; SIMATIC WinCC (TIA Portal) Professional V13 before SP2 and V14 before SP1; SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced before 14; SIMATIC STEP 7 (TIA Portal) V13 before SP2; SIMATIC NET PC-Software before V14; SINEMA Remote Connect Client; SINEMA Server before V13 SP2; SIMATIC WinAC RTX 2010 SP2; SIMATIC WinAC RTX F 2010 SP2; SIMATIC IT Production Suite before V7.0 SP1 HFX 2; TeleControl Server Basic before 3.0 SP2; SOFTNET Security Client 5.0; SIMIT V9.0 before SP1; Security Configuration Tool (SCT) before V4.3 HF1; and Primary Setup Tool (PST), when the installation does not use the %PROGRAMFILES% directory, might allow local users to gain privileges via a Trojan horse executable file.
  • Modified Analysis by [email protected]

    Jan. 03, 2017

    Action Type Old Value New Value
    Changed Reference Type http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html No Types Assigned http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html Third Party Advisory
  • CVE Modified by [email protected]

    Jan. 03, 2017

    Action Type Old Value New Value
    Added Reference http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html [No Types Assigned]
  • Modified Analysis by [email protected]

    Dec. 23, 2016

    Action Type Old Value New Value
    Changed Reference Type https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02 No Types Assigned https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02 Third Party Advisory, US Government Resource
    Changed Reference Type http://www.securityfocus.com/bid/94158 No Types Assigned http://www.securityfocus.com/bid/94158 Third Party Advisory, VDB Entry
  • CVE Modified by [email protected]

    Dec. 23, 2016

    Action Type Old Value New Value
    Added Reference https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 28, 2016

    Action Type Old Value New Value
    Added Reference http://www.securityfocus.com/bid/94158 [No Types Assigned]
  • Reanalysis by [email protected]

    Nov. 17, 2016

    Action Type Old Value New Value
    Changed CVSS V3 AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • Initial Analysis by [email protected]

    Nov. 17, 2016

    Action Type Old Value New Value
    Added CPE Configuration Configuration 1 OR *cpe:2.3:a:siemens:primary_setup_tool:-:*:*:*:*:*:*:* *cpe:2.3:a:siemens:security_configuration_tool:-:*:*:*:*:*:*:* *cpe:2.3:a:siemens:simit:9.0:*:*:*:*:*:*:* *cpe:2.3:a:siemens:softnet_security_client:5.0:*:*:*:*:*:*:* (and previous) *cpe:2.3:a:siemens:telecontrol_basic:3.0:sp2:*:*:*:*:*:* (and previous) *cpe:2.3:a:siemens:simatic_it_production_suite:-:*:*:*:*:*:*:* *cpe:2.3:a:siemens:simatic_winac_rtx_f_2010:-:*:*:*:*:*:*:* *cpe:2.3:a:siemens:simatic_winac_rtx_2010:-:*:*:*:*:*:*:* *cpe:2.3:a:siemens:sinema_remote_connect:-:*:*:*:*:*:*:* *cpe:2.3:a:siemens:sinema_server:13.0:sp2:*:*:*:*:*:* (and previous) *cpe:2.3:a:siemens:simatic_net_pc_software:14.0:*:*:*:*:*:*:* (and previous) *cpe:2.3:a:siemens:simatic_step_7_\(tia_portal\):14.0:*:*:*:*:*:*:* (and previous) *cpe:2.3:a:siemens:simatic_wincc_\(tia_portal\):14.0:*:*:*:basic:*:*:* (and previous) *cpe:2.3:a:siemens:simatic_wincc_\(tia_portal\):14.0:*:*:*:advanced:*:*:* (and previous) *cpe:2.3:a:siemens:simatic_wincc_\(tia_portal\):14.0:*:*:*:comfort:*:*:* (and previous) *cpe:2.3:a:siemens:simatic_wincc_\(tia_portal\):-:*:*:*:professional:*:*:* *cpe:2.3:a:siemens:simatic_wincc_runtime:-:*:*:*:professional:*:*:* *cpe:2.3:a:siemens:simatic_step_7:5.5:sp4:*:*:*:*:*:* (and previous) *cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:* *cpe:2.3:a:siemens:simatic_wincc:7.3:*:*:*:*:*:*:* *cpe:2.3:a:siemens:simatic_wincc:7.2:*:*:*:*:*:*:* *cpe:2.3:a:siemens:simatic_wincc:7.0:sp3:*:*:*:*:*:* *cpe:2.3:a:siemens:simatic_wincc:7.0:sp2:*:*:*:*:*:* (and previous) *cpe:2.3:a:siemens:simatic_pcs7:8.2:*:*:*:*:*:*:* *cpe:2.3:a:siemens:simatic_pcs7:8.1:*:*:*:*:*:*:* *cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:* *cpe:2.3:a:siemens:simatic_pcs_7:7.1:*:*:*:*:*:*:* (and previous)
    Added CVSS V2 (AV:L/AC:M/Au:N/C:C/I:C/A:C)
    Added CVSS V3 AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
    Changed Reference Type http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-701708.pdf No Types Assigned http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-701708.pdf Vendor Advisory
    Added CWE CWE-284
    Added CWE CWE-254
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2016-7165 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.06 }} -0.00%

score

0.27246

percentile

CVSS30 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability