CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
EPSS
Percentile
70.3%
Siemens Simatic WinCC TIA Portal
Version: 12.0 and earlier
Application link:
http://www.siemens.com/
Severity level: Medium
Impact: Autentication hijacking
Access Vector: Remote
CVSS v2:
Base Score: 6.8
Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVE: CVE-2013-4911
WinCC TIA Portal is part of a new, integrated engineering concept which offers a uniform engineering environment for programming and configuration of control, visualization and drive solutions.
The specialists of the Positive Research center have detected “Cross-Site Request Forgery” vulnerability in Siemens Simatic WinCC TIA Portal.
Cross-site request forgery (CSRF) vulnerability in Siemens WinCC (TIA Portal) allows remote attackers to hijack the authentication of unspecified victims by leveraging improper configuration of SIMATIC HMI panels by the WinCC product.
Update your software up to the latest version
02.08.2012 - Vendor gets vulnerability details
31.07.2013 - Vendor releases fixed version and details
19.08.2013 - Public disclosure
The vulnerability was discovered by Timur Yunusov, Sergey Bobrov, Positive Research Center (Positive Technologies Company)
<http://en.securitylab.ru/lab/PT-2013-50>
<http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-064884.pdf>[](<http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-212483.pdf>)
Reports on the vulnerabilities previously discovered by Positive Research:
<http://ptsecurity.com/research/advisory/>
<http://en.securitylab.ru/lab/>