CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
EPSS
Percentile
76.2%
SIMATIC WinCC Open Architecture
Version: 3.12 and earlier
Link:
http://www.siemens.com/
Severity level: Medium
Impact: Access to Sensitive Information
Access Vector: Remote
CVSS v2:
Base Score: 5.0
Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE: CVE-2014-1698
SIMATIC WinCC Open Architecture is a SCADA system for visualizing and operating processes, production flows, machines and plants in all lines of business.
The specialists of the Positive Research center have detected a Relative path traversal vulnerability in SIMATIC WinCC Open Architecture.
The SIMATIC WinCC OA integrated Web server at Port 4999/TCP might allow attackers to traverse through the serverβs file system based on the applicationβs Windows user permissions by sending specially crafted packets over the network without authentication.
Update your software up to the latest version
01.12.2013 - Vendor gets vulnerability details
03.02.2014 - Vendor releases fixed version and details
14.02.2014 - Public disclosure
The vulnerability was detected by Kirill Nesterov, Positive Research Center (Positive Technologies Company)
<http://en.securitylab.ru/lab/PT-2013-79>
<http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-342587.pdf>
<https://ics-cert.us-cert.gov/advisories/ICSA-14-035-01>
Reports on the vulnerabilities previously discovered by Positive Research:
<http://www.ptsecurity.com/research/advisory/>
<http://en.securitylab.ru/lab/>