CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
51.7%
Siemens WinCC
Version: 7.2 and earlier
Siemens SIMATIC PCS 7
Version: 8.0 SP1 and earlier
Application link:
http://www.siemens.com/
Severity level: High
Impact: SQL Injection
Access Vector: Remote
CVSS v2:
Base Score: 10
Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE: CVE-2013-3957
Siemens WinCC is a part of Siemens SIMATIC HMI software that aimed to provide connection between an operator and PLCs that manage technological processes. The WebNavigator component of WinCC gives the users the possibility to control their plants via the web browser with the same look-and-feel like local operator stations.
The specialists of the Positive Research center have detected “SQL Injection” vulnerability in Siemens WinCC and SIMATIC PCS 7.
The WinCC Web Navigator 7.2 and Runtime Client (OPC protocol) have input filtering in the login screen an attacker can overcome, allowing injection of SQL statements into queries. An attacker could gain elevated privileges by manipulating the database. This could allow the attacker to obtain full system access.
Update your software up to the latest version
13.01.2013 - Vendor gets vulnerability details
14.06.2013 - Vendor releases fixed version and details
03.07.2013 - Public disclosure
The vulnerability was detected by Sergey Gordeychik, Timur Yunusov, Positive Research Center (Positive Technologies Company)
<http://en.securitylab.ru/lab/PT-2013-42>
<http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf>
<https://ics-cert.us-cert.gov/advisories/ICSA-13-169-02>
Reports on the vulnerabilities previously discovered by Positive Research:
<http://ptsecurity.com/research/advisory/>
<http://en.securitylab.ru/lab/>