Siemens Simatic WinCC WebNavigator
Version: 7.0 SP3 and earlier
Application link:
http://www.siemens.com/
Severity level: High
Impact: SQL Injection
Access Vector: Remote
CVSS v2:
Base Score: 9.0
Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:C)
CVE: CVE-2012-3032
Simatic WinCC is a part of Siemens SIMATIC HMI software that aimed to provide connection between an operator and PLCs that manage technological processes. The WebNavigator component of WinCC gives the users the possibility to control their plants via the web browser with the same look-and-feel like local operator stations.
The specialists of the Positive Research center have detected “SQL Injection” vulnerability in Siemens Simatic WinCC WebNavigator.
WebNavigator uses part of the content of SOAP messages to create SQL database queries. If an attacker sends a specially crafted SOAP message to the server, the resulting SQL queries might read or write more data in the database than originally intended.
Update your software up to the latest version
16.07.2012 - Vendor is notified
16.07.2012 - Vendor gets vulnerability details
10.09.2012 - Vendor releases fixed version and details
13.09.2012 - Public disclosure
The vulnerability was discovered by Denis Baranov, Vladimir Kochetkov, Positive Research Center (Positive Technologies Company)
<http://en.securitylab.ru/lab/PT-2012-44>
<http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf>
Reports on the vulnerabilities previously discovered by Positive Research:
<http://ptsecurity.com/research/advisory/>
<http://en.securitylab.ru/lab/>