CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
90.5%
SIMATIC WinCC Open Architecture
Version: 3.12 and earlier
Link:
http://www.siemens.com/
Severity level: High
Impact: Arbitrary Code Execution
Access Vector: Remote
CVSS v2:
Base Score: 9.3
Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE: CVE-2014-1697
SIMATIC WinCC Open Architecture is a SCADA system for visualizing and operating processes, production flows, machines and plants in all lines of business.
The specialists of the Positive Research center have detected a Buffer overflow vulnerability in SIMATIC WinCC Open Architecture.
The SIMATIC WinCC OA integrated Web server at Port 4999/TCP might allow attackers to perform remote code execution by sending specially crafted packets without authentication.
Update your software up to the latest version
01.12.2013 - Vendor gets vulnerability details
03.02.2014 - Vendor releases fixed version and details
14.02.2014 - Public disclosure
The vulnerability was detected by Kirill Nesterov, Positive Research Center (Positive Technologies Company)
<http://en.securitylab.ru/lab/PT-2013-78>
<http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-342587.pdf>
<https://ics-cert.us-cert.gov/advisories/ICSA-14-035-01>
Reports on the vulnerabilities previously discovered by Positive Research:
<http://www.ptsecurity.com/research/advisory/>
<http://en.securitylab.ru/lab/>