7.8 CVE-2023-38557

Privilege Escalation CSRF
 

A vulnerability has been identified in Spectrum Power 7 (All versions < V23Q3). The affected product assigns improper access rights to the update script. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges.
https://nvd.nist.gov/vuln/detail/CVE-2023-38557

Categories

CWE-732 : Incorrect Permission Assignment for Critical Resource
When a resource is given a permission setting that provides access to a wider range of actors than required, it could lead to the exposure of sensitive information, or the modification of that resource by unintended parties. This is especially dangerous when the resource is related to program configuration, execution, or sensitive user data. For example, consider a misconfigured storage account for the cloud that can be read or written by a public or anonymous user.

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:* < 23q3


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

Other (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
1 Accessing Functionality Not Properly Constrained by ACLs
High
122 Privilege Abuse
Medium
127 Directory Indexing
Medium
17 Using Malicious Files
Very High
180 Exploiting Incorrectly Configured Access Control Security Levels
Medium
206 Signing Malicious Code
Very High
234 Hijacking a privileged process
Medium
60 Reusing Session IDs (aka Session Replay)
High
61 Session Fixation
High
62 Cross Site Request Forgery
Very High
642 Replace Binaries
High


MITRE


Techniques

id description
T1083 File and Directory Discovery
T1134.001 Access Token Manipulation:Token Impersonation/Theft
T1505.005 Server Software Component: Terminal Services DLL
T1548 Abuse Elevation Control Mechanism
T1550.004 Use Alternate Authentication Material:Web Session Cookie
T1553.002 Subvert Trust Controls:Code Signing
T1554 Compromise Client Software Binary
T1574.005 Hijack Execution Flow: Executable Installer File Permissions Weakness
T1574.010 Hijack Execution Flow: ServicesFile Permissions Weakness
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
T1134.001 An adversary must already have administrator level access on the local system to make full use of this technique; be sure to restrict users and accounts to the least privileges they require.
T1505.005 Consider using Group Policy to configure and block modifications to Terminal Services parameters in the Registry.
T1548 Although UAC bypass techniques exist, it is still prudent to use the highest enforcement level for UAC when possible and mitigate bypass opportunities that exist with techniques such as DLL Search Order Hijacking.
T1550.004 Configure browsers or tasks to regularly delete persistent cookies.
T1554 Ensure all application component binaries are signed by the correct application developers.
T1574.005 Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service binary target path locations. Deny execution from user directories such as file download directories and temp directories where able.
T1574.010 Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service binary target path locations. Deny execution from user directories such as file download directories and temp directories where able.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.