CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
88.8%
SIMATIC WinCC Open Architecture
Version: 3.12 and earlier
Link:
http://www.siemens.com/
Severity level: Medium
Impact: Denial of Service
Access Vector: Remote
CVSS v2:
Base Score: 5.0
Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE: CVE-2014-1699
SIMATIC WinCC Open Architecture is a SCADA system for visualizing and operating processes, production flows, machines and plants in all lines of business.
The specialists of the Positive Research center have detected an Improper input validation vulnerability in SIMATIC WinCC Open Architecture.
The SIMATIC WinCC OA integrated Web server at Port 4999/TCP might allow attackers to perform a denial of service attack on the SIMATIC WinCC OA monitoring service by sending malformed HTTP requests over the network without authentication. Restarting the WinCC OA Console recovers the monitoring service.
Update your software up to the latest version
01.12.2013 - Vendor gets vulnerability details
03.02.2014 - Vendor releases fixed version and details
14.02.2014 - Public disclosure
The vulnerability was detected by Gleb Gritsai and Kirill Nesterov, Positive Research Center (Positive Technologies Company)
<http://en.securitylab.ru/lab/PT-2013-80>
<http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-342587.pdf>
<https://ics-cert.us-cert.gov/advisories/ICSA-14-035-01>
Reports on the vulnerabilities previously discovered by Positive Research:
<http://www.ptsecurity.com/research/advisory/>
<http://en.securitylab.ru/lab/>