Zurück zur Übersicht

Miele: Security vulnerability in Benchmark Programming Tool

VDE-2022-015
Last update
27.04.2022 14:00
Published at
27.04.2022 14:00
Vendor(s)
Miele & Cie KG
External ID
VDE-2022-015
CSAF Document

Summary

The Miele Benchmark Programming Tool on a Microsoft Windows operating system, selects a folder by default upon installation that is writable for all users (C:\MIELE_SERVICE). After the installation of the tool, users without administrative privileges are able to exchange or delete executable files in this path.

Impact

Affected Product(s)

Model no. Product name Affected versions
Benchmark Programming Tool <=1.2.71 Benchmark Programming Tool <=1.2.71

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:58
Weakness
Improper Privilege Management (CWE-269)
Summary

In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin.

References

Mitigation

A new version (1.2.72) of the Benchmark Programming Tool, which closes the named vulnerability, is available for download on the Miele website: www.miele.de/p/miele-benchmark-progra...

Remediation

As a further risk-minimizing measure, the write permissions of the installation folder C:\Miele_Service\ Miele Benchmark Programming Tool can be adjusted so that an exchange of files is only possible with administrative permissions. This is also possible without reinstalling or updating the tool. The procedure for adjusting the permissions depends on the Microsoft Windows operating system environment used and in most cases requires administrative rights.

Revision History

Version Date Summary
1 27.04.2022 14:00 Initial revision.