{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T07:36:51.773","vulnerabilities":[{"cve":{"id":"CVE-2019-10934","sourceIdentifier":"productcert@siemens.com","published":"2020-01-16T16:15:14.373","lastModified":"2024-11-21T04:20:11.010","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in TIA Portal V14 (All versions), TIA Portal V15 (All versions < V15.1 Update 7), TIA Portal V16 (All versions < V16 Update 6), TIA Portal V17 (All versions < V17 Update 4). Changing the contents of a configuration file could allow an attacker to execute arbitrary code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. No user interaction is required. At the time of advisory publication no public exploitation of this security vulnerability was known."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en TIA Portal V14 (Todas las versiones), TIA Portal V15 (Todas las versiones anteriores a V15.1 Actualización 7), TIA Portal V16 (Todas las versiones anteriores a V16 Actualización 6), TIA Portal V17 (Todas las versiones anteriores a V17 Actualización 4). La modificación del contenido de un archivo de configuración podría permitir a un atacante ejecutar código arbitrario con privilegios de SYSTEM. La vulnerabilidad de seguridad podría ser explotada por un atacante con una cuenta válida y derechos de acceso limitados en el sistema. No se requiere ninguna interacción del usuario. En el momento de la publicación del aviso no se conocía ninguna explotación pública de esta vulnerabilidad de seguridad"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:totally_integrated_automation_portal:*:*:*:*:*:*:*:*","versionStartIncluding":"14","versionEndIncluding":"17","matchCriteriaId":"542852A3-FB22-473E-B442-D97A57176A9E"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-629512.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-629512.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}