All the vulnerabilites related to siemens - simatic_pcs7
cve-2012-3032
Vulnerability from cvelistv5
Published
2012-09-18 14:00
Modified
2024-09-17 03:22
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to execute arbitrary SQL commands via a crafted SOAP message.
References
▼ | URL | Tags |
---|---|---|
http://en.securitylab.ru/lab/PT-2012-44 | x_refsource_MISC | |
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.463Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/PT-2012-44" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to execute arbitrary SQL commands via a crafted SOAP message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-18T14:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/PT-2012-44" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-3032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to execute arbitrary SQL commands via a crafted SOAP message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://en.securitylab.ru/lab/PT-2012-44", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/PT-2012-44" }, { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-3032", "datePublished": "2012-09-18T14:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-17T03:22:48.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0679
Vulnerability from cvelistv5
Published
2013-03-21 15:00
Modified
2024-09-16 16:12
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in the web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote authenticated users to read arbitrary files via vectors involving a query for a pathname.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote authenticated users to read arbitrary files via vectors involving a query for a pathname." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-21T15:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-0679", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote authenticated users to read arbitrary files via vectors involving a query for a pathname." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-0679", "datePublished": "2013-03-21T15:00:00Z", "dateReserved": "2012-12-19T00:00:00Z", "dateUpdated": "2024-09-16T16:12:24.678Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-4683
Vulnerability from cvelistv5
Published
2014-07-24 14:00
Modified
2024-08-06 11:27
Severity ?
EPSS score ?
Summary
The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote authenticated users to gain privileges via a (1) HTTP or (2) HTTPS request.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:27:35.268Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote authenticated users to gain privileges via a (1) HTTP or (2) HTTPS request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-07-24T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-4683", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote authenticated users to gain privileges via a (1) HTTP or (2) HTTPS request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-4683", "datePublished": "2014-07-24T14:00:00", "dateReserved": "2014-06-28T00:00:00", "dateUpdated": "2024-08-06T11:27:35.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-7165
Vulnerability from cvelistv5
Published
2016-11-15 19:00
Modified
2024-08-06 01:50
Severity ?
EPSS score ?
Summary
A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC IT Production Suite (All versions < V7.0 SP1 HFX 2), SIMATIC NET PC-Software (All versions < V14), SIMATIC PCS 7 V7.1 (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 V5.X (All versions < V5.5 SP4 HF11), SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced (All versions < V14), SIMATIC WinCC (TIA Portal) Professional V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) Professional V14 (All versions < V14 SP1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1), SIMATIC WinCC V7.0 SP2 and earlier versions (All versions < V7.0 SP2 Upd 12), SIMATIC WinCC V7.0 SP3 (All versions < V7.0 SP3 Upd 8), SIMATIC WinCC V7.2 (All versions < V7.2 Upd 14), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 11), SIMATIC WinCC V7.4 (All versions < V7.4 SP1), SIMIT V9.0 (All versions < V9.0 SP1), SINEMA Remote Connect Client (All versions < V1.0 SP3), SINEMA Server (All versions < V13 SP2), SOFTNET Security Client V5.0 (All versions), Security Configuration Tool (SCT) (All versions < V4.3 HF1), TeleControl Server Basic (All versions < V3.0 SP2), WinAC RTX 2010 SP2 (All versions), WinAC RTX F 2010 SP2 (All versions). Unquoted service paths could allow local Microsoft Windows operating system users to escalate their privileges if the affected products are not installed under their default path ("C:\Program Files\*" or the localized equivalent).
References
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02 | x_refsource_MISC | |
http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/94158 | vdb-entry, x_refsource_BID | |
https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:50:47.526Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html" }, { "name": "94158", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94158" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-11-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Primary Setup Tool (PST) (All versions \u003c V4.2 HF1), SIMATIC IT Production Suite (All versions \u003c V7.0 SP1 HFX 2), SIMATIC NET PC-Software (All versions \u003c V14), SIMATIC PCS 7 V7.1 (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions \u003c V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions \u003c V13 SP2), SIMATIC STEP 7 V5.X (All versions \u003c V5.5 SP4 HF11), SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced (All versions \u003c V14), SIMATIC WinCC (TIA Portal) Professional V13 (All versions \u003c V13 SP2), SIMATIC WinCC (TIA Portal) Professional V14 (All versions \u003c V14 SP1), SIMATIC WinCC Runtime Professional V13 (All versions \u003c V13 SP2), SIMATIC WinCC Runtime Professional V14 (All versions \u003c V14 SP1), SIMATIC WinCC V7.0 SP2 and earlier versions (All versions \u003c V7.0 SP2 Upd 12), SIMATIC WinCC V7.0 SP3 (All versions \u003c V7.0 SP3 Upd 8), SIMATIC WinCC V7.2 (All versions \u003c V7.2 Upd 14), SIMATIC WinCC V7.3 (All versions \u003c V7.3 Upd 11), SIMATIC WinCC V7.4 (All versions \u003c V7.4 SP1), SIMIT V9.0 (All versions \u003c V9.0 SP1), SINEMA Remote Connect Client (All versions \u003c V1.0 SP3), SINEMA Server (All versions \u003c V13 SP2), SOFTNET Security Client V5.0 (All versions), Security Configuration Tool (SCT) (All versions \u003c V4.3 HF1), TeleControl Server Basic (All versions \u003c V3.0 SP2), WinAC RTX 2010 SP2 (All versions), WinAC RTX F 2010 SP2 (All versions). Unquoted service paths could allow local Microsoft Windows operating system users to escalate their privileges if the affected products are not installed under their default path (\"C:\\Program Files\\*\" or the localized equivalent)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-14T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02" }, { "tags": [ "x_refsource_MISC" ], "url": "http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html" }, { "name": "94158", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94158" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-7165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in Primary Setup Tool (PST) (All versions \u003c V4.2 HF1), SIMATIC IT Production Suite (All versions \u003c V7.0 SP1 HFX 2), SIMATIC NET PC-Software (All versions \u003c V14), SIMATIC PCS 7 V7.1 (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions \u003c V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions \u003c V13 SP2), SIMATIC STEP 7 V5.X (All versions \u003c V5.5 SP4 HF11), SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced (All versions \u003c V14), SIMATIC WinCC (TIA Portal) Professional V13 (All versions \u003c V13 SP2), SIMATIC WinCC (TIA Portal) Professional V14 (All versions \u003c V14 SP1), SIMATIC WinCC Runtime Professional V13 (All versions \u003c V13 SP2), SIMATIC WinCC Runtime Professional V14 (All versions \u003c V14 SP1), SIMATIC WinCC V7.0 SP2 and earlier versions (All versions \u003c V7.0 SP2 Upd 12), SIMATIC WinCC V7.0 SP3 (All versions \u003c V7.0 SP3 Upd 8), SIMATIC WinCC V7.2 (All versions \u003c V7.2 Upd 14), SIMATIC WinCC V7.3 (All versions \u003c V7.3 Upd 11), SIMATIC WinCC V7.4 (All versions \u003c V7.4 SP1), SIMIT V9.0 (All versions \u003c V9.0 SP1), SINEMA Remote Connect Client (All versions \u003c V1.0 SP3), SINEMA Server (All versions \u003c V13 SP2), SOFTNET Security Client V5.0 (All versions), Security Configuration Tool (SCT) (All versions \u003c V4.3 HF1), TeleControl Server Basic (All versions \u003c V3.0 SP2), WinAC RTX 2010 SP2 (All versions), WinAC RTX F 2010 SP2 (All versions). Unquoted service paths could allow local Microsoft Windows operating system users to escalate their privileges if the affected products are not installed under their default path (\"C:\\Program Files\\*\" or the localized equivalent)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02" }, { "name": "http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html", "refsource": "MISC", "url": "http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html" }, { "name": "94158", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94158" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-7165", "datePublished": "2016-11-15T19:00:00", "dateReserved": "2016-09-08T00:00:00", "dateUpdated": "2024-08-06T01:50:47.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0674
Vulnerability from cvelistv5
Published
2013-03-21 15:00
Modified
2024-09-16 19:47
Severity ?
EPSS score ?
Summary
Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to execute arbitrary code via a long parameter.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to execute arbitrary code via a long parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-21T15:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-0674", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to execute arbitrary code via a long parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-0674", "datePublished": "2013-03-21T15:00:00Z", "dateReserved": "2012-12-19T00:00:00Z", "dateUpdated": "2024-09-16T19:47:06.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3959
Vulnerability from cvelistv5
Published
2013-06-14 19:00
Modified
2024-09-16 20:42
Severity ?
EPSS score ?
Summary
The Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, exhibits different behavior for NetBIOS user names depending on whether the user account exists, which allows remote authenticated users to enumerate account names via crafted URL parameters.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:49.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, exhibits different behavior for NetBIOS user names depending on whether the user account exists, which allows remote authenticated users to enumerate account names via crafted URL parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-14T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3959", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, exhibits different behavior for NetBIOS user names depending on whether the user account exists, which allows remote authenticated users to enumerate account names via crafted URL parameters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3959", "datePublished": "2013-06-14T19:00:00Z", "dateReserved": "2013-06-05T00:00:00Z", "dateUpdated": "2024-09-16T20:42:00.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3028
Vulnerability from cvelistv5
Published
2012-09-18 14:00
Modified
2024-09-16 20:32
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to hijack the authentication of arbitrary users for requests that modify data or cause a denial of service.
References
▼ | URL | Tags |
---|---|---|
http://en.securitylab.ru/lab/PT-2012-42 | x_refsource_MISC | |
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.408Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/PT-2012-42" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to hijack the authentication of arbitrary users for requests that modify data or cause a denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-18T14:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/PT-2012-42" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-3028", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to hijack the authentication of arbitrary users for requests that modify data or cause a denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://en.securitylab.ru/lab/PT-2012-42", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/PT-2012-42" }, { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-3028", "datePublished": "2012-09-18T14:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-16T20:32:23.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-4686
Vulnerability from cvelistv5
Published
2014-07-24 14:00
Modified
2024-08-06 11:27
Severity ?
EPSS score ?
Summary
The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, has a hardcoded encryption key, which allows remote attackers to obtain sensitive information by extracting this key from another product installation and then employing this key during the sniffing of network traffic on TCP port 1030.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:27:35.236Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, has a hardcoded encryption key, which allows remote attackers to obtain sensitive information by extracting this key from another product installation and then employing this key during the sniffing of network traffic on TCP port 1030." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-07-24T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-4686", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, has a hardcoded encryption key, which allows remote attackers to obtain sensitive information by extracting this key from another product installation and then employing this key during the sniffing of network traffic on TCP port 1030." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-4686", "datePublished": "2014-07-24T14:00:00", "dateReserved": "2014-06-28T00:00:00", "dateUpdated": "2024-08-06T11:27:35.236Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8551
Vulnerability from cvelistv5
Published
2014-11-26 11:00
Modified
2024-08-06 13:18
Severity ?
EPSS score ?
Summary
The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to execute arbitrary code via crafted packets.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:18:48.431Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to execute arbitrary code via crafted packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-11-26T06:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8551", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to execute arbitrary code via crafted packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8551", "datePublished": "2014-11-26T11:00:00", "dateReserved": "2014-10-30T00:00:00", "dateUpdated": "2024-08-06T13:18:48.431Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-4685
Vulnerability from cvelistv5
Published
2014-07-24 14:00
Modified
2024-08-06 11:27
Severity ?
EPSS score ?
Summary
Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows local users to gain privileges by leveraging weak system-object access control.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:27:35.335Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows local users to gain privileges by leveraging weak system-object access control." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-07-24T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-4685", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows local users to gain privileges by leveraging weak system-object access control." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-4685", "datePublished": "2014-07-24T14:00:00", "dateReserved": "2014-06-28T00:00:00", "dateUpdated": "2024-08-06T11:27:35.335Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3958
Vulnerability from cvelistv5
Published
2013-06-14 19:00
Modified
2024-09-16 18:07
Severity ?
EPSS score ?
Summary
The login implementation in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, has a hardcoded account, which makes it easier for remote attackers to obtain access via an unspecified request.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:49.335Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The login implementation in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, has a hardcoded account, which makes it easier for remote attackers to obtain access via an unspecified request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-14T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3958", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The login implementation in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, has a hardcoded account, which makes it easier for remote attackers to obtain access via an unspecified request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3958", "datePublished": "2013-06-14T19:00:00Z", "dateReserved": "2013-06-05T00:00:00Z", "dateUpdated": "2024-09-16T18:07:49.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0676
Vulnerability from cvelistv5
Published
2013-03-21 15:00
Modified
2024-09-16 16:32
Severity ?
EPSS score ?
Summary
Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not properly assign privileges for the database containing WebNavigator credentials, which allows remote authenticated users to obtain sensitive information via a SQL query.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not properly assign privileges for the database containing WebNavigator credentials, which allows remote authenticated users to obtain sensitive information via a SQL query." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-21T15:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-0676", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not properly assign privileges for the database containing WebNavigator credentials, which allows remote authenticated users to obtain sensitive information via a SQL query." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-0676", "datePublished": "2013-03-21T15:00:00Z", "dateReserved": "2012-12-19T00:00:00Z", "dateUpdated": "2024-09-16T16:32:26.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-14023
Vulnerability from cvelistv5
Published
2017-11-06 22:00
Modified
2024-08-05 19:13
Severity ?
EPSS score ?
Summary
An Improper Input Validation issue was discovered in Siemens SIMATIC PCS 7 V8.1 prior to V8.1 SP1 with WinCC V7.3 Upd 13, and V8.2 all versions. The improper input validation vulnerability has been identified, which may allow an authenticated remote attacker who is a member of the administrators group to crash services by sending specially crafted messages to the DCOM interface.
References
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-17-306-01 | x_refsource_MISC | |
http://www.securitytracker.com/id/1039729 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/101680 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Siemens SIMATIC PCS 7 |
Version: Siemens SIMATIC PCS 7 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:13:41.630Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-306-01" }, { "name": "1039729", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039729" }, { "name": "101680", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101680" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Siemens SIMATIC PCS 7", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Siemens SIMATIC PCS 7" } ] } ], "datePublic": "2017-11-06T00:00:00", "descriptions": [ { "lang": "en", "value": "An Improper Input Validation issue was discovered in Siemens SIMATIC PCS 7 V8.1 prior to V8.1 SP1 with WinCC V7.3 Upd 13, and V8.2 all versions. The improper input validation vulnerability has been identified, which may allow an authenticated remote attacker who is a member of the administrators group to crash services by sending specially crafted messages to the DCOM interface." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-08T10:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-306-01" }, { "name": "1039729", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039729" }, { "name": "101680", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101680" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2017-14023", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Siemens SIMATIC PCS 7", "version": { "version_data": [ { "version_value": "Siemens SIMATIC PCS 7" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Improper Input Validation issue was discovered in Siemens SIMATIC PCS 7 V8.1 prior to V8.1 SP1 with WinCC V7.3 Upd 13, and V8.2 all versions. The improper input validation vulnerability has been identified, which may allow an authenticated remote attacker who is a member of the administrators group to crash services by sending specially crafted messages to the DCOM interface." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-306-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-306-01" }, { "name": "1039729", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039729" }, { "name": "101680", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101680" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2017-14023", "datePublished": "2017-11-06T22:00:00", "dateReserved": "2017-08-30T00:00:00", "dateUpdated": "2024-08-05T19:13:41.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-4684
Vulnerability from cvelistv5
Published
2014-07-24 14:00
Modified
2024-08-06 11:27
Severity ?
EPSS score ?
Summary
The database server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote authenticated users to gain privileges via a request to TCP port 1433.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:27:35.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The database server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote authenticated users to gain privileges via a request to TCP port 1433." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-07-24T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-4684", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The database server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote authenticated users to gain privileges via a request to TCP port 1433." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-4684", "datePublished": "2014-07-24T14:00:00", "dateReserved": "2014-06-28T00:00:00", "dateUpdated": "2024-08-06T11:27:35.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-4682
Vulnerability from cvelistv5
Published
2014-07-24 14:00
Modified
2024-08-06 11:27
Severity ?
EPSS score ?
Summary
The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote attackers to obtain sensitive information via an HTTP request.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:27:35.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote attackers to obtain sensitive information via an HTTP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-07-24T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-4682", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote attackers to obtain sensitive information via an HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-4682", "datePublished": "2014-07-24T14:00:00", "dateReserved": "2014-06-28T00:00:00", "dateUpdated": "2024-08-06T11:27:35.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8552
Vulnerability from cvelistv5
Published
2014-11-26 11:00
Modified
2024-08-06 13:18
Severity ?
EPSS score ?
Summary
The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to read arbitrary files via crafted packets.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:18:48.641Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to read arbitrary files via crafted packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-11-26T06:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8552", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to read arbitrary files via crafted packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8552", "datePublished": "2014-11-26T11:00:00", "dateReserved": "2014-10-30T00:00:00", "dateUpdated": "2024-08-06T13:18:48.641Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3015
Vulnerability from cvelistv5
Published
2012-07-26 10:00
Modified
2024-09-16 19:31
Severity ?
EPSS score ?
Summary
Untrusted search path vulnerability in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7 7.1 SP3 and earlier and other products, allows local users to gain privileges via a Trojan horse DLL in a STEP7 project folder.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICSA-12-205-02.pdf | x_refsource_MISC | |
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-110665.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-205-02.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-110665.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7 7.1 SP3 and earlier and other products, allows local users to gain privileges via a Trojan horse DLL in a STEP7 project folder." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-26T10:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-205-02.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-110665.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-3015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7 7.1 SP3 and earlier and other products, allows local users to gain privileges via a Trojan horse DLL in a STEP7 project folder." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-205-02.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-205-02.pdf" }, { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-110665.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-110665.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-3015", "datePublished": "2012-07-26T10:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-16T19:31:37.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0678
Vulnerability from cvelistv5
Published
2013-03-21 15:00
Modified
2024-09-17 00:01
Severity ?
EPSS score ?
Summary
Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not properly represent WebNavigator credentials in a database, which makes it easier for remote authenticated users to obtain sensitive information via a SQL query.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not properly represent WebNavigator credentials in a database, which makes it easier for remote authenticated users to obtain sensitive information via a SQL query." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-21T15:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-0678", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not properly represent WebNavigator credentials in a database, which makes it easier for remote authenticated users to obtain sensitive information via a SQL query." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-0678", "datePublished": "2013-03-21T15:00:00Z", "dateReserved": "2012-12-19T00:00:00Z", "dateUpdated": "2024-09-17T00:01:41.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3031
Vulnerability from cvelistv5
Published
2012-09-18 14:00
Modified
2024-09-16 20:07
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allow remote attackers to inject arbitrary web script or HTML via a (1) GET parameter, (2) POST parameter, or (3) Referer HTTP header.
References
▼ | URL | Tags |
---|---|---|
http://en.securitylab.ru/lab/PT-2012-42 | x_refsource_MISC | |
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/PT-2012-42" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allow remote attackers to inject arbitrary web script or HTML via a (1) GET parameter, (2) POST parameter, or (3) Referer HTTP header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-18T14:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/PT-2012-42" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-3031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allow remote attackers to inject arbitrary web script or HTML via a (1) GET parameter, (2) POST parameter, or (3) Referer HTTP header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://en.securitylab.ru/lab/PT-2012-42", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/PT-2012-42" }, { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-3031", "datePublished": "2012-09-18T14:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-16T20:07:39.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0675
Vulnerability from cvelistv5
Published
2013-03-21 15:00
Modified
2024-09-16 19:36
Severity ?
EPSS score ?
Summary
Buffer overflow in CCEServer (aka the central communications component) in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to cause a denial of service via a crafted packet.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in CCEServer (aka the central communications component) in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to cause a denial of service via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-21T15:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-0675", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in CCEServer (aka the central communications component) in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to cause a denial of service via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-0675", "datePublished": "2013-03-21T15:00:00Z", "dateReserved": "2012-12-19T00:00:00Z", "dateUpdated": "2024-09-16T19:36:20.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12069
Vulnerability from cvelistv5
Published
2017-08-30 19:00
Modified
2024-08-05 18:28
Severity ?
EPSS score ?
Summary
An XXE vulnerability has been identified in OPC Foundation UA .NET Sample Code before 2017-03-21 and Local Discovery Server (LDS) before 1.03.367. Among the affected products are Siemens SIMATIC PCS7 (All versions V8.1 and earlier), SIMATIC WinCC (All versions < V7.4 SP1), SIMATIC WinCC Runtime Professional (All versions < V14 SP1), SIMATIC NET PC Software, and SIMATIC IT Production Suite. By sending specially crafted packets to the OPC Discovery Server at port 4840/tcp, an attacker might cause the system to access various resources chosen by the attacker.
References
▼ | URL | Tags |
---|---|---|
https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2017-12069.pdf | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039510 | vdb-entry, x_refsource_SECTRACK | |
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-535640.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/100559 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:28:15.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2017-12069.pdf" }, { "name": "1039510", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039510" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-535640.pdf" }, { "name": "100559", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100559" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-30T00:00:00", "descriptions": [ { "lang": "en", "value": "An XXE vulnerability has been identified in OPC Foundation UA .NET Sample Code before 2017-03-21 and Local Discovery Server (LDS) before 1.03.367. Among the affected products are Siemens SIMATIC PCS7 (All versions V8.1 and earlier), SIMATIC WinCC (All versions \u003c V7.4 SP1), SIMATIC WinCC Runtime Professional (All versions \u003c V14 SP1), SIMATIC NET PC Software, and SIMATIC IT Production Suite. By sending specially crafted packets to the OPC Discovery Server at port 4840/tcp, an attacker might cause the system to access various resources chosen by the attacker." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-05T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2017-12069.pdf" }, { "name": "1039510", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039510" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-535640.pdf" }, { "name": "100559", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100559" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12069", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An XXE vulnerability has been identified in OPC Foundation UA .NET Sample Code before 2017-03-21 and Local Discovery Server (LDS) before 1.03.367. Among the affected products are Siemens SIMATIC PCS7 (All versions V8.1 and earlier), SIMATIC WinCC (All versions \u003c V7.4 SP1), SIMATIC WinCC Runtime Professional (All versions \u003c V14 SP1), SIMATIC NET PC Software, and SIMATIC IT Production Suite. By sending specially crafted packets to the OPC Discovery Server at port 4840/tcp, an attacker might cause the system to access various resources chosen by the attacker." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2017-12069.pdf", "refsource": "CONFIRM", "url": "https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2017-12069.pdf" }, { "name": "1039510", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039510" }, { "name": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-535640.pdf", "refsource": "CONFIRM", "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-535640.pdf" }, { "name": "100559", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100559" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-12069", "datePublished": "2017-08-30T19:00:00", "dateReserved": "2017-07-31T00:00:00", "dateUpdated": "2024-08-05T18:28:15.650Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0677
Vulnerability from cvelistv5
Published
2013-03-21 15:00
Modified
2024-09-16 23:10
Severity ?
EPSS score ?
Summary
The web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to obtain sensitive information or cause a denial of service via a crafted project file.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to obtain sensitive information or cause a denial of service via a crafted project file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-21T15:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-0677", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to obtain sensitive information or cause a denial of service via a crafted project file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-0677", "datePublished": "2013-03-21T15:00:00Z", "dateReserved": "2012-12-19T00:00:00Z", "dateUpdated": "2024-09-16T23:10:58.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3030
Vulnerability from cvelistv5
Published
2012-09-18 14:00
Modified
2024-09-16 20:27
Severity ?
EPSS score ?
Summary
WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, stores sensitive information under the web root with insufficient access control, which allows remote attackers to read a (1) log file or (2) configuration file via a direct request.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf | x_refsource_CONFIRM | |
http://en.securitylab.ru/lab/PT-2012-43 | x_refsource_MISC | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/PT-2012-43" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, stores sensitive information under the web root with insufficient access control, which allows remote attackers to read a (1) log file or (2) configuration file via a direct request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-18T14:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/PT-2012-43" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-3030", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, stores sensitive information under the web root with insufficient access control, which allows remote attackers to read a (1) log file or (2) configuration file via a direct request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "name": "http://en.securitylab.ru/lab/PT-2012-43", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/PT-2012-43" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-3030", "datePublished": "2012-09-18T14:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-16T20:27:37.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3034
Vulnerability from cvelistv5
Published
2012-09-18 14:00
Modified
2024-09-16 20:02
Severity ?
EPSS score ?
Summary
WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to discover a username and password via crafted parameters to unspecified methods in ActiveX controls.
References
▼ | URL | Tags |
---|---|---|
http://en.securitylab.ru/lab/PT-2012-45 | x_refsource_MISC | |
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.356Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.securitylab.ru/lab/PT-2012-45" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to discover a username and password via crafted parameters to unspecified methods in ActiveX controls." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-18T14:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://en.securitylab.ru/lab/PT-2012-45" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-3034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to discover a username and password via crafted parameters to unspecified methods in ActiveX controls." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://en.securitylab.ru/lab/PT-2012-45", "refsource": "MISC", "url": "http://en.securitylab.ru/lab/PT-2012-45" }, { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-3034", "datePublished": "2012-09-18T14:00:00Z", "dateReserved": "2012-05-30T00:00:00Z", "dateUpdated": "2024-09-16T20:02:55.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3957
Vulnerability from cvelistv5
Published
2013-06-14 19:00
Modified
2024-09-16 20:06
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in the login screen in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:49.146Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the login screen in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, allows remote attackers to execute arbitrary SQL commands via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-14T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3957", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in the login screen in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, allows remote attackers to execute arbitrary SQL commands via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3957", "datePublished": "2013-06-14T19:00:00Z", "dateReserved": "2013-06-05T00:00:00Z", "dateUpdated": "2024-09-16T20:06:43.322Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2012-09-18 14:55
Modified
2024-11-21 01:40
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allow remote attackers to inject arbitrary web script or HTML via a (1) GET parameter, (2) POST parameter, or (3) Referer HTTP header.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "5AC094B0-B1BE-436D-A8D3-2008D0CDE070", "versionEndIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allow remote attackers to inject arbitrary web script or HTML via a (1) GET parameter, (2) POST parameter, or (3) Referer HTTP header." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en Web Navigator en Siemens WinCC v7.0 SP3 y versiones anteriores, tal y como se usan en SIMATIC PCS v7 y otros productos, permiten a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de un par\u00e1metro (1) GET, (2) POST, o (3) una cabecera HTTP Referer.\r\n" } ], "id": "CVE-2012-3031", "lastModified": "2024-11-21T01:40:09.087", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-09-18T14:55:01.490", "references": [ { "source": "ics-cert@hq.dhs.gov", "url": "http://en.securitylab.ru/lab/PT-2012-42" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/PT-2012-42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-07-24 14:55
Modified
2024-11-21 02:10
Severity ?
Summary
The database server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote authenticated users to gain privileges via a request to TCP port 1433.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_pcs7 | * | |
siemens | simatic_pcs7 | 7.1 | |
siemens | simatic_pcs7 | 8.0 | |
siemens | wincc | * | |
siemens | wincc | 5.0 | |
siemens | wincc | 5.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.1 | |
siemens | wincc | 7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "0165209F-7378-4C05-9373-ECA6EA57697D", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "33FA164B-E269-4140-AC85-2623356AF636", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "74484B5D-121B-4838-9072-019532E78A03", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B16BB99-49E0-443E-BEE0-C7694D2C54E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "A4115260-50FC-40C9-81CF-4D9F97394627", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The database server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote authenticated users to gain privileges via a request to TCP port 1433." }, { "lang": "es", "value": "El servidor de la base de datos en Siemens SIMATIC WinCC anterior a 7.3, utilizado en PCS7 y otros productos, permite a usuarios remotos autenticados ganar privilegios a trav\u00e9s de una solicitud en el puerto TCP 1433." } ], "id": "CVE-2014-4684", "lastModified": "2024-11-21T02:10:41.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-07-24T14:55:08.097", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-09-18 14:55
Modified
2024-11-21 01:40
Severity ?
Summary
WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to discover a username and password via crafted parameters to unspecified methods in ActiveX controls.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "5AC094B0-B1BE-436D-A8D3-2008D0CDE070", "versionEndIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to discover a username and password via crafted parameters to unspecified methods in ActiveX controls." }, { "lang": "es", "value": "WebNavigator en Siemens WinCC v7.0 SP3 y anteriores, como se usa en SIMATIC PCS7 y otros productos, permite a atacantes remotos descubrir un nombre de usuario y contrase\u00f1a a trav\u00e9s de par\u00e1metros modificados en m\u00e9todos no especificados de controles ActiveX" } ], "id": "CVE-2012-3034", "lastModified": "2024-11-21T01:40:09.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-18T14:55:01.583", "references": [ { "source": "ics-cert@hq.dhs.gov", "url": "http://en.securitylab.ru/lab/PT-2012-45" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/PT-2012-45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-26 11:59
Modified
2024-11-21 02:19
Severity ?
Summary
The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to read arbitrary files via crafted packets.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_pcs_7 | 7.1 | |
siemens | simatic_pcs7 | 7.1 | |
siemens | simatic_pcs7 | 7.1 | |
siemens | simatic_pcs7 | 8.0 | |
siemens | simatic_pcs7 | 8.0 | |
siemens | simatic_pcs7 | 8.1 | |
siemens | simatic_tiaportal | 13.0 | |
siemens | simatic_tiaportal | 13.0 | |
siemens | simatic_tiaportal | 13.0 | |
siemens | simatic_wincc | 7.0 | |
siemens | simatic_wincc | 7.0 | |
siemens | simatic_wincc | 7.0 | |
siemens | simatic_wincc | 7.0 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs_7:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "BE258BF2-AD82-401C-B020-08A22A549A25", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "33FA164B-E269-4140-AC85-2623356AF636", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "D62C7959-87D9-42EC-A224-2EE6EF23C1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "428F68D2-8C1D-4ADE-A6FB-65EC4C426F99", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "14193511-1B9B-4319-92AE-BB26F398550C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "172A6A81-C32E-4ACC-AB8C-2014BF3A6901", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_tiaportal:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "19C3A00B-A47E-4723-B652-B64FDC5F2601", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_tiaportal:13.0:3:*:*:*:*:*:*", "matchCriteriaId": "144DE778-4439-489F-830D-B4742BB11FEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_tiaportal:13.0:5:*:*:*:*:*:*", "matchCriteriaId": "39B75B5E-7979-4E3B-BE94-AE04F17A6F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CF84FC5-9450-47B7-A4F0-99361C528C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E8274939-833E-40E1-8D2E-1B28CEA91036", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "61F46206-F232-4F62-AF4F-E2DCF462AE60", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "0D0BB2E6-1444-499A-943E-8D19C402F1BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:1:*:*:*:*:*:*", "matchCriteriaId": "2D6E154F-F8A0-4E9D-BC37-E95B1820D2BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:2:*:*:*:*:*:*", "matchCriteriaId": "D6745F96-FA72-457B-AD14-07C4B353310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:3:*:*:*:*:*:*", "matchCriteriaId": "E555D458-59C4-4CBC-95F4-CBA503BCCB24", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:4:*:*:*:*:*:*", "matchCriteriaId": "3BEE67FC-D188-4B0C-A837-FC91B406982E", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:5:*:*:*:*:*:*", "matchCriteriaId": "75121F46-303D-4416-8FBD-1938BDD60AAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:6:*:*:*:*:*:*", "matchCriteriaId": "FF8B251F-399E-4165-B3A6-801775212C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:7:*:*:*:*:*:*", "matchCriteriaId": "FBE45DD1-630F-448F-90FE-D3CC00266EF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:8:*:*:*:*:*:*", "matchCriteriaId": "CFC7DC1F-B4C5-4116-9B53-706F2B3227DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.3:1:*:*:*:*:*:*", "matchCriteriaId": "B8F27E75-90CD-4C3B-AF0E-90EF338A2D91", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to read arbitrary files via crafted packets." }, { "lang": "es", "value": "El servidor WinCC en Siemens SIMATIC WinCC 7.0 hasta SP3, 7.2 anterior a la actualizaci\u00f3n 9, y 7.3 anterior a la actualizaci\u00f3n 2; SIMATIC PCS 7 7.1 hasta SP4, 8.0 hasta SP2; y 8.1; y TIA Portal 13 anterior a la actualizaci\u00f3n 6 permite a atacantes remotos leer ficheros arbitrarios a trav\u00e9s de paquetes manipulados." } ], "id": "CVE-2014-8552", "lastModified": "2024-11-21T02:19:19.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-26T11:59:01.373", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-21 15:55
Modified
2024-11-21 01:47
Severity ?
Summary
Buffer overflow in CCEServer (aka the central communications component) in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to cause a denial of service via a crafted packet.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF12A0-B105-4225-B818-F858C75047B0", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "33FA164B-E269-4140-AC85-2623356AF636", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B34F3397-62D2-4D9C-A3DA-1BEE4A2A69FC", "versionEndIncluding": "7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in CCEServer (aka the central communications component) in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to cause a denial of service via a crafted packet." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en CCEServer (tambi\u00e9n conocido como el componente central de comunicaciones) en Siemens WinCC antes de v7,2, tal como se utiliza en SIMATIC PCS v7 antes de v8,0 SP1 y otros productos, permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de un paquete dise\u00f1ado." } ], "id": "CVE-2013-0675", "lastModified": "2024-11-21T01:47:59.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-21T15:55:01.553", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-06 22:29
Modified
2024-11-21 03:11
Severity ?
Summary
An Improper Input Validation issue was discovered in Siemens SIMATIC PCS 7 V8.1 prior to V8.1 SP1 with WinCC V7.3 Upd 13, and V8.2 all versions. The improper input validation vulnerability has been identified, which may allow an authenticated remote attacker who is a member of the administrators group to crash services by sending specially crafted messages to the DCOM interface.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/101680 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | http://www.securitytracker.com/id/1039729 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-17-306-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101680 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039729 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-17-306-01 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_pcs7 | 8.1 | |
siemens | simatic_wincc | 7.3 | |
siemens | simatic_pcs7 | 8.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.1:-:*:*:*:*:*:*", "matchCriteriaId": "0D964D2E-63D5-4793-B772-E61CE0586B39", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.3:update13:*:*:*:*:*:*", "matchCriteriaId": "CB472A4C-E0FA-42E7-96C2-1C9FD2B1A8B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.2:-:*:*:*:*:*:*", "matchCriteriaId": "A67CAAE5-FDF6-4F19-B7C8-73CAF5A6E303", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Input Validation issue was discovered in Siemens SIMATIC PCS 7 V8.1 prior to V8.1 SP1 with WinCC V7.3 Upd 13, and V8.2 all versions. The improper input validation vulnerability has been identified, which may allow an authenticated remote attacker who is a member of the administrators group to crash services by sending specially crafted messages to the DCOM interface." }, { "lang": "es", "value": "Se ha descubierto un problema de validaci\u00f3n incorrecta de entradas en Siemens SIMATIC PCS 7 V8.1 en versiones anteriores a V8.1 SP1 con WinCC V7.3 Upd 13 y V8.2 en todas las versiones. Se ha identificado la vulnerabilidad de validaci\u00f3n incorrecta de entradas, que podr\u00eda permitir que un atacante remoto autenticado que sea miembro del grupo de administradores provoque el cierre inesperado de servicios mediante el env\u00edo de mensajes especialmente manipulados a la interfaz DCOM." } ], "id": "CVE-2017-14023", "lastModified": "2024-11-21T03:11:58.977", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-06T22:29:00.270", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101680" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039729" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-306-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-306-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-26 11:59
Modified
2024-11-21 02:19
Severity ?
Summary
The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to execute arbitrary code via crafted packets.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_pcs_7 | 7.1 | |
siemens | simatic_pcs7 | 7.1 | |
siemens | simatic_pcs7 | 7.1 | |
siemens | simatic_pcs7 | 8.0 | |
siemens | simatic_pcs7 | 8.0 | |
siemens | simatic_pcs7 | 8.1 | |
siemens | simatic_tiaportal | 13.0 | |
siemens | simatic_tiaportal | 13.0 | |
siemens | simatic_tiaportal | 13.0 | |
siemens | simatic_wincc | 7.0 | |
siemens | simatic_wincc | 7.0 | |
siemens | simatic_wincc | 7.0 | |
siemens | simatic_wincc | 7.0 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.2 | |
siemens | simatic_wincc | 7.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs_7:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "BE258BF2-AD82-401C-B020-08A22A549A25", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "33FA164B-E269-4140-AC85-2623356AF636", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "D62C7959-87D9-42EC-A224-2EE6EF23C1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "428F68D2-8C1D-4ADE-A6FB-65EC4C426F99", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "14193511-1B9B-4319-92AE-BB26F398550C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "172A6A81-C32E-4ACC-AB8C-2014BF3A6901", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_tiaportal:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "19C3A00B-A47E-4723-B652-B64FDC5F2601", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_tiaportal:13.0:3:*:*:*:*:*:*", "matchCriteriaId": "144DE778-4439-489F-830D-B4742BB11FEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_tiaportal:13.0:5:*:*:*:*:*:*", "matchCriteriaId": "39B75B5E-7979-4E3B-BE94-AE04F17A6F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CF84FC5-9450-47B7-A4F0-99361C528C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E8274939-833E-40E1-8D2E-1B28CEA91036", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "61F46206-F232-4F62-AF4F-E2DCF462AE60", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "0D0BB2E6-1444-499A-943E-8D19C402F1BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:1:*:*:*:*:*:*", "matchCriteriaId": "2D6E154F-F8A0-4E9D-BC37-E95B1820D2BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:2:*:*:*:*:*:*", "matchCriteriaId": "D6745F96-FA72-457B-AD14-07C4B353310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:3:*:*:*:*:*:*", "matchCriteriaId": "E555D458-59C4-4CBC-95F4-CBA503BCCB24", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:4:*:*:*:*:*:*", "matchCriteriaId": "3BEE67FC-D188-4B0C-A837-FC91B406982E", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:5:*:*:*:*:*:*", "matchCriteriaId": "75121F46-303D-4416-8FBD-1938BDD60AAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:6:*:*:*:*:*:*", "matchCriteriaId": "FF8B251F-399E-4165-B3A6-801775212C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:7:*:*:*:*:*:*", "matchCriteriaId": "FBE45DD1-630F-448F-90FE-D3CC00266EF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:8:*:*:*:*:*:*", "matchCriteriaId": "CFC7DC1F-B4C5-4116-9B53-706F2B3227DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.3:1:*:*:*:*:*:*", "matchCriteriaId": "B8F27E75-90CD-4C3B-AF0E-90EF338A2D91", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to execute arbitrary code via crafted packets." }, { "lang": "es", "value": "El servidor WinCC en Siemens SIMATIC WinCC 7.0 hasta SP3, 7.2 anterior a la actualizaci\u00f3n 9, y 7.3 anterior a la actualizaci\u00f3n 2; SIMATIC PCS 7 7.1 hasta SP4, 8.0 hasta SP2, y 8.1; y TIA Portal 13 anterior a la actualizaci\u00f3n 6 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes manipulados." } ], "id": "CVE-2014-8551", "lastModified": "2024-11-21T02:19:19.247", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-26T11:59:00.093", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-21 15:55
Modified
2024-11-21 01:47
Severity ?
Summary
Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to execute arbitrary code via a long parameter.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF12A0-B105-4225-B818-F858C75047B0", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "33FA164B-E269-4140-AC85-2623356AF636", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B34F3397-62D2-4D9C-A3DA-1BEE4A2A69FC", "versionEndIncluding": "7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to execute arbitrary code via a long parameter." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el control ActiveX RegReader en Siemens WinCC antes de v7,2, tal como se utiliza en SIMATIC PCS v7 antes de v8,0 SP1 y otros productos, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un par\u00e1metro largo." } ], "id": "CVE-2013-0674", "lastModified": "2024-11-21T01:47:59.223", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-21T15:55:01.533", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-06-14 19:55
Modified
2024-11-21 01:54
Severity ?
Summary
SQL injection vulnerability in the login screen in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "0165209F-7378-4C05-9373-ECA6EA57697D", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "74484B5D-121B-4838-9072-019532E78A03", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B16BB99-49E0-443E-BEE0-C7694D2C54E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "A4115260-50FC-40C9-81CF-4D9F97394627", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the login screen in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, allows remote attackers to execute arbitrary SQL commands via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en la pantalla de login en el Web Navigator en Siemens WinCC anterior a 7.2 Update 1, utilizado en SIMATIC PCS7 8.0 SP1 y anteriores y sobre otros productos, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-3957", "lastModified": "2024-11-21T01:54:37.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-14T19:55:01.233", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-21 15:55
Modified
2024-11-21 01:47
Severity ?
Summary
Directory traversal vulnerability in the web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote authenticated users to read arbitrary files via vectors involving a query for a pathname.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF12A0-B105-4225-B818-F858C75047B0", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "33FA164B-E269-4140-AC85-2623356AF636", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B34F3397-62D2-4D9C-A3DA-1BEE4A2A69FC", "versionEndIncluding": "7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote authenticated users to read arbitrary files via vectors involving a query for a pathname." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en el servidor web en Siemens WinCC anterior a v7.2, como se usa en SIMATIC PCS7 anterior a v8.0 SP1 y otros productos, permite a usuarios remotamente autenticados leer ficheros a trav\u00e9s de vectores que implican una consulta al pathname." } ], "id": "CVE-2013-0679", "lastModified": "2024-11-21T01:47:59.783", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-21T15:55:01.613", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-06-14 19:55
Modified
2024-11-21 01:54
Severity ?
Summary
The Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, exhibits different behavior for NetBIOS user names depending on whether the user account exists, which allows remote authenticated users to enumerate account names via crafted URL parameters.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "0165209F-7378-4C05-9373-ECA6EA57697D", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "74484B5D-121B-4838-9072-019532E78A03", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B16BB99-49E0-443E-BEE0-C7694D2C54E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "A4115260-50FC-40C9-81CF-4D9F97394627", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, exhibits different behavior for NetBIOS user names depending on whether the user account exists, which allows remote authenticated users to enumerate account names via crafted URL parameters." }, { "lang": "es", "value": "El navegador Web de Siemens WinCC antes de v7.2 Update 1, tal y como se utiliza en SIMATIC PCS7 v8.0 SP1 y anteriores y otros productos, muestra un comportamiento diferente para los nombres de usuario de NetBIOS en funci\u00f3n de si existe o no la cuenta de usuario, lo que permite a usuarios remotos autenticados enumerar nombres de cuenta a trav\u00e9s de par\u00e1metros de la URL modificados a mano." } ], "id": "CVE-2013-3959", "lastModified": "2024-11-21T01:54:37.447", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-14T19:55:01.270", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-26 10:41
Modified
2024-11-21 01:40
Severity ?
Summary
Untrusted search path vulnerability in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7 7.1 SP3 and earlier and other products, allows local users to gain privileges via a Trojan horse DLL in a STEP7 project folder.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_pcs7 | * | |
siemens | simatic_step_7 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "27E6D609-BFD5-46D2-BA2F-156DBD5BF38B", "versionEndIncluding": "7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*", "matchCriteriaId": "640B7EFA-E1BD-4350-A995-FD235F62A27F", "versionEndIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7 7.1 SP3 and earlier and other products, allows local users to gain privileges via a Trojan horse DLL in a STEP7 project folder." }, { "lang": "es", "value": "Una vulnerabilidad de ruta de b\u00fasqueda no confiable en Siemens SIMATIC STEP7 v5.5 SP1, tal como se utilizan en SIMATIC PCS7 v7.1 Service Pack 3 y productos anteriores y de otro tipo, permite a usuarios locales conseguir privilegios a trav\u00e9s de un DLL troyano en una carpeta de proyecto de STEP7.\r\n" } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n\u0027CWE-426: Untrusted Search Path\u0027", "id": "CVE-2012-3015", "lastModified": "2024-11-21T01:40:07.597", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-07-26T10:41:47.980", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-110665.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-205-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-110665.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-205-02.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-06-14 19:55
Modified
2024-11-21 01:54
Severity ?
Summary
The login implementation in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, has a hardcoded account, which makes it easier for remote attackers to obtain access via an unspecified request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "0165209F-7378-4C05-9373-ECA6EA57697D", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "74484B5D-121B-4838-9072-019532E78A03", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B16BB99-49E0-443E-BEE0-C7694D2C54E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "A4115260-50FC-40C9-81CF-4D9F97394627", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The login implementation in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, has a hardcoded account, which makes it easier for remote attackers to obtain access via an unspecified request." }, { "lang": "es", "value": "La implementaci\u00f3n de inicio de sesi\u00f3n en Web Navigator en Siemens WinCC anterior 7.2 Update 1, utilizado en SIMATIC PCS7 8.0 SP1 y anteriores y otros productos, tienen una cuenta embebida en el c\u00f3digo (hardcoded), lo que facilita a atacantes remotos obtener acceso a trav\u00e9s de una petici\u00f3n no especificada." } ], "id": "CVE-2013-3958", "lastModified": "2024-11-21T01:54:37.307", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-14T19:55:01.250", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-21 15:55
Modified
2024-11-21 01:47
Severity ?
Summary
The web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to obtain sensitive information or cause a denial of service via a crafted project file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF12A0-B105-4225-B818-F858C75047B0", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "33FA164B-E269-4140-AC85-2623356AF636", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B34F3397-62D2-4D9C-A3DA-1BEE4A2A69FC", "versionEndIncluding": "7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to obtain sensitive information or cause a denial of service via a crafted project file." }, { "lang": "es", "value": "El servidor web en Siemens WinCC antes de v7,2, tal como se utiliza en SIMATIC PCS v7 antes de v8,0 SP1 y otros productos, permite a atacantes remotos obtener informaci\u00f3n sensible o causar una denegaci\u00f3n de servicio a trav\u00e9s de un archivo de proyecto elaborado." } ], "id": "CVE-2013-0677", "lastModified": "2024-11-21T01:47:59.553", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-03-21T15:55:01.583", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-07-24 14:55
Modified
2024-11-21 02:10
Severity ?
Summary
The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, has a hardcoded encryption key, which allows remote attackers to obtain sensitive information by extracting this key from another product installation and then employing this key during the sniffing of network traffic on TCP port 1030.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_pcs7 | * | |
siemens | simatic_pcs7 | 7.1 | |
siemens | simatic_pcs7 | 8.0 | |
siemens | wincc | * | |
siemens | wincc | 5.0 | |
siemens | wincc | 5.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.1 | |
siemens | wincc | 7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "0165209F-7378-4C05-9373-ECA6EA57697D", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "33FA164B-E269-4140-AC85-2623356AF636", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "74484B5D-121B-4838-9072-019532E78A03", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B16BB99-49E0-443E-BEE0-C7694D2C54E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "A4115260-50FC-40C9-81CF-4D9F97394627", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, has a hardcoded encryption key, which allows remote attackers to obtain sensitive information by extracting this key from another product installation and then employing this key during the sniffing of network traffic on TCP port 1030." }, { "lang": "es", "value": "La aplicaci\u00f3n de administraci\u00f3n del proyecto en Siemens SIMATIC WinCC anterior a 7.3, utilizado en PCS7 y otros productos, tiene una clave de codificaci\u00f3n embebida, lo que permite a atacantes remotos obtener informaci\u00f3n sensible mediante la extracci\u00f3n de esta clave de otra instalaci\u00f3n del producto y la posterior utilizaci\u00f3n de esta clave durante la captura de trafico de la red en puerto TCP 1030." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/798.html\" target=\"_blank\"\u003eCWE-798: CWE-798: Use of Hard-coded Credentials\u003c/a\u003e", "id": "CVE-2014-4686", "lastModified": "2024-11-21T02:10:42.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-07-24T14:55:08.190", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-30 19:29
Modified
2024-11-21 03:08
Severity ?
Summary
An XXE vulnerability has been identified in OPC Foundation UA .NET Sample Code before 2017-03-21 and Local Discovery Server (LDS) before 1.03.367. Among the affected products are Siemens SIMATIC PCS7 (All versions V8.1 and earlier), SIMATIC WinCC (All versions < V7.4 SP1), SIMATIC WinCC Runtime Professional (All versions < V14 SP1), SIMATIC NET PC Software, and SIMATIC IT Production Suite. By sending specially crafted packets to the OPC Discovery Server at port 4840/tcp, an attacker might cause the system to access various resources chosen by the attacker.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_pcs7 | * | |
siemens | wincc | * | |
ocpfoundation | local_discovery_server | * | |
ocpfoundation | ua_.net | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6D19542-FDC9-4CBC-A75A-370DE4B4C929", "versionEndIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C4AD3A6-D8F1-4DE0-9B08-25F95753F666", "versionEndIncluding": "7.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ocpfoundation:local_discovery_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5A47D3C-FE15-48DC-9A2B-C2F4A1B74AD6", "versionEndIncluding": "1.01.333.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ocpfoundation:ua_.net:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE0DC426-A197-41CF-A2D3-C2A959736F80", "versionEndIncluding": "2017-03-21", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An XXE vulnerability has been identified in OPC Foundation UA .NET Sample Code before 2017-03-21 and Local Discovery Server (LDS) before 1.03.367. Among the affected products are Siemens SIMATIC PCS7 (All versions V8.1 and earlier), SIMATIC WinCC (All versions \u003c V7.4 SP1), SIMATIC WinCC Runtime Professional (All versions \u003c V14 SP1), SIMATIC NET PC Software, and SIMATIC IT Production Suite. By sending specially crafted packets to the OPC Discovery Server at port 4840/tcp, an attacker might cause the system to access various resources chosen by the attacker." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad XXE en OPC Foundation UA .NET Sample Code antes del 21-03-2017 y Local Discovery Server (LDS) antes de la versi\u00f3n 1.03.367. Los siguientes productos se han visto afectados por esta vulnerabilidad, entre otros: Siemens SIMATIC PCS7 (todas las versiones V8.1 y anteriores), SIMATIC WinCC (todas las versiones anteriores a V7.4 SP1), SIMATIC WinCC Runtime Professional (todas las versiones anteriores a V14 SP1), SIMATIC NET PC Software y SIMATIC IT Production Suite. Un atacante podr\u00eda hacer que el sistema acceda a varios recursos escogidos por el atacante mediante el env\u00edo de paquetes especialmente manipulados a OPC Discovery Server en el puerto 4840/tcp." } ], "id": "CVE-2017-12069", "lastModified": "2024-11-21T03:08:46.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-30T19:29:00.210", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100559" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1039510" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2017-12069.pdf" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-535640.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1039510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2017-12069.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-535640.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-09-18 14:55
Modified
2024-11-21 01:40
Severity ?
Summary
WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, stores sensitive information under the web root with insufficient access control, which allows remote attackers to read a (1) log file or (2) configuration file via a direct request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "5AC094B0-B1BE-436D-A8D3-2008D0CDE070", "versionEndIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, stores sensitive information under the web root with insufficient access control, which allows remote attackers to read a (1) log file or (2) configuration file via a direct request." }, { "lang": "es", "value": "WebNavigator en Siemens WinCC v7.0 SP3 y anteriores, como las usadas en SIMATIC PCS7 y otros productos, almacena informaci\u00f3n sensible bajo l directorio web raiz con un control de acceso no suficiente, lo que permite a atacantes remotos a leer (1) ficheros de registro o (2) ficheros de configuraci\u00f3n a trav\u00e9s de una petici\u00f3n directa." } ], "id": "CVE-2012-3030", "lastModified": "2024-11-21T01:40:08.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-18T14:55:01.443", "references": [ { "source": "ics-cert@hq.dhs.gov", "url": "http://en.securitylab.ru/lab/PT-2012-43" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/PT-2012-43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-21 15:55
Modified
2024-11-21 01:47
Severity ?
Summary
Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not properly assign privileges for the database containing WebNavigator credentials, which allows remote authenticated users to obtain sensitive information via a SQL query.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF12A0-B105-4225-B818-F858C75047B0", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "33FA164B-E269-4140-AC85-2623356AF636", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B34F3397-62D2-4D9C-A3DA-1BEE4A2A69FC", "versionEndIncluding": "7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not properly assign privileges for the database containing WebNavigator credentials, which allows remote authenticated users to obtain sensitive information via a SQL query." }, { "lang": "es", "value": "Siemens WinCC anterior a v7.2, usado en SIMATIC PCS7 anterior a v8.0 SP1 y otros productos, no asigna correctamente los privilegios de la base de datos que contiene las credenciales WebNavigator, lo que permite a usuarios autenticados obtener informaci\u00f3n a trav\u00e9s de consultas SQL." } ], "id": "CVE-2013-0676", "lastModified": "2024-11-21T01:47:59.443", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-21T15:55:01.567", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-07-24 14:55
Modified
2024-11-21 02:10
Severity ?
Summary
Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows local users to gain privileges by leveraging weak system-object access control.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_pcs7 | * | |
siemens | simatic_pcs7 | 7.1 | |
siemens | simatic_pcs7 | 8.0 | |
siemens | wincc | * | |
siemens | wincc | 5.0 | |
siemens | wincc | 5.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.1 | |
siemens | wincc | 7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "0165209F-7378-4C05-9373-ECA6EA57697D", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "33FA164B-E269-4140-AC85-2623356AF636", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "74484B5D-121B-4838-9072-019532E78A03", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B16BB99-49E0-443E-BEE0-C7694D2C54E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "A4115260-50FC-40C9-81CF-4D9F97394627", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows local users to gain privileges by leveraging weak system-object access control." }, { "lang": "es", "value": "Siemens SIMATIC WinCC anterior a 7.3, utilizado en PCS7 y otros productos, permite a usuarios locales ganar privilegios mediante el aprovechamiento de controles d\u00e9biles del acceso a objetos de sistema." } ], "id": "CVE-2014-4685", "lastModified": "2024-11-21T02:10:42.087", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-07-24T14:55:08.143", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-07-24 14:55
Modified
2024-11-21 02:10
Severity ?
Summary
The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote attackers to obtain sensitive information via an HTTP request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_pcs7 | * | |
siemens | simatic_pcs7 | 7.1 | |
siemens | simatic_pcs7 | 8.0 | |
siemens | wincc | * | |
siemens | wincc | 5.0 | |
siemens | wincc | 5.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.1 | |
siemens | wincc | 7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "0165209F-7378-4C05-9373-ECA6EA57697D", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "33FA164B-E269-4140-AC85-2623356AF636", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "74484B5D-121B-4838-9072-019532E78A03", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B16BB99-49E0-443E-BEE0-C7694D2C54E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "A4115260-50FC-40C9-81CF-4D9F97394627", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote attackers to obtain sensitive information via an HTTP request." }, { "lang": "es", "value": "El servidor WebNavigator en Siemens SIMATIC WinCC anterior a 7.3, utilizado en PCS7 y otros productos, permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una solicitud HTTP." } ], "id": "CVE-2014-4682", "lastModified": "2024-11-21T02:10:41.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-07-24T14:55:08.020", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-09-18 14:55
Modified
2024-11-21 01:40
Severity ?
Summary
SQL injection vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to execute arbitrary SQL commands via a crafted SOAP message.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "5AC094B0-B1BE-436D-A8D3-2008D0CDE070", "versionEndIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to execute arbitrary SQL commands via a crafted SOAP message." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en Siemens WinCC v7.0 SP3 y anteriores, como se usa en SIMATIC PCS7 y otros productos, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de un mensaje SOAP modificado." } ], "id": "CVE-2012-3032", "lastModified": "2024-11-21T01:40:09.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-18T14:55:01.537", "references": [ { "source": "ics-cert@hq.dhs.gov", "url": "http://en.securitylab.ru/lab/PT-2012-44" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/PT-2012-44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-11-15 19:30
Modified
2024-11-21 02:57
Severity ?
Summary
A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC IT Production Suite (All versions < V7.0 SP1 HFX 2), SIMATIC NET PC-Software (All versions < V14), SIMATIC PCS 7 V7.1 (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 V5.X (All versions < V5.5 SP4 HF11), SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced (All versions < V14), SIMATIC WinCC (TIA Portal) Professional V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) Professional V14 (All versions < V14 SP1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1), SIMATIC WinCC V7.0 SP2 and earlier versions (All versions < V7.0 SP2 Upd 12), SIMATIC WinCC V7.0 SP3 (All versions < V7.0 SP3 Upd 8), SIMATIC WinCC V7.2 (All versions < V7.2 Upd 14), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 11), SIMATIC WinCC V7.4 (All versions < V7.4 SP1), SIMIT V9.0 (All versions < V9.0 SP1), SINEMA Remote Connect Client (All versions < V1.0 SP3), SINEMA Server (All versions < V13 SP2), SOFTNET Security Client V5.0 (All versions), Security Configuration Tool (SCT) (All versions < V4.3 HF1), TeleControl Server Basic (All versions < V3.0 SP2), WinAC RTX 2010 SP2 (All versions), WinAC RTX F 2010 SP2 (All versions). Unquoted service paths could allow local Microsoft Windows operating system users to escalate their privileges if the affected products are not installed under their default path ("C:\Program Files\*" or the localized equivalent).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html | Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/94158 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf | ||
cve@mitre.org | https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94158 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:primary_setup_tool:-:*:*:*:*:*:*:*", "matchCriteriaId": "8046A64D-4C80-4199-B1A7-F77D02428ACD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:security_configuration_tool:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33765E4-619E-4566-BF96-4A7C8776A0CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_it_production_suite:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBCAF7A5-CA65-4D88-8473-67947726CA2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_net_pc_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "87DF85DE-B86C-459A-A9A9-096AF7A661E6", "versionEndIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DFBFF6B-DBC8-451D-A235-4C7E1F0883D5", "versionEndIncluding": "7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "172A6A81-C32E-4ACC-AB8C-2014BF3A6901", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "8C6E8BBF-C5FF-4F13-AC70-2FF41CF3CC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_step_7:*:sp4:*:*:*:*:*:*", "matchCriteriaId": "C60C6533-1875-4E5B-A367-F6C1C1345CCF", "versionEndIncluding": "5.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_step_7_\\(tia_portal\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "A4053231-D271-4A23-B0A0-374F6EAE2EF8", "versionEndIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_winac_rtx_2010:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD93D757-C2DE-444C-9FF4-A7A700EFF7F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_winac_rtx_f_2010:-:*:*:*:*:*:*:*", "matchCriteriaId": "042D7AB5-8DB7-478E-8CB8-31942D360B34", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "B9D3442E-E362-49BA-8699-629A611A6E2E", "versionEndIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "0D0BB2E6-1444-499A-943E-8D19C402F1BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C4BFBED-E818-453C-B787-22D67B4A5A29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D6229A2-9B8E-4F76-8425-589D2CE58B16", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F64B795A-7E66-49AE-BE40-E8EEAC12D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):*:*:*:*:advanced:*:*:*", "matchCriteriaId": "882F53D9-7AAA-4647-B071-A45CA2618AA1", "versionEndIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):*:*:*:*:basic:*:*:*", "matchCriteriaId": "F4524CA7-833B-4577-A5E5-DB47704F49AF", "versionEndIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):*:*:*:*:comfort:*:*:*", "matchCriteriaId": "58782A2B-6A27-475A-9FAB-0272DED5DB40", "versionEndIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):-:*:*:*:professional:*:*:*", "matchCriteriaId": "D9BA6A34-593E-466A-B11B-1E2DC890ECF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc_runtime:-:*:*:*:professional:*:*:*", "matchCriteriaId": "E6BFBAED-EE2B-4DE4-A76C-824DD15F4608", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simit:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "939DE56D-D8D7-42B8-BC0C-D6727E99AFA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:sinema_remote_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "9646F056-080A-4F45-AABD-4D6E8AF05148", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:sinema_server:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "3F8B6E52-C339-41B9-A2C1-A6D161251648", "versionEndIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:softnet_security_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "18BFF869-4E4E-4410-91F7-56A7E959C0FE", "versionEndIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:telecontrol_basic:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "A9386816-33A5-4DA7-931B-841AAE40E3BE", "versionEndIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Primary Setup Tool (PST) (All versions \u003c V4.2 HF1), SIMATIC IT Production Suite (All versions \u003c V7.0 SP1 HFX 2), SIMATIC NET PC-Software (All versions \u003c V14), SIMATIC PCS 7 V7.1 (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions \u003c V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions \u003c V13 SP2), SIMATIC STEP 7 V5.X (All versions \u003c V5.5 SP4 HF11), SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced (All versions \u003c V14), SIMATIC WinCC (TIA Portal) Professional V13 (All versions \u003c V13 SP2), SIMATIC WinCC (TIA Portal) Professional V14 (All versions \u003c V14 SP1), SIMATIC WinCC Runtime Professional V13 (All versions \u003c V13 SP2), SIMATIC WinCC Runtime Professional V14 (All versions \u003c V14 SP1), SIMATIC WinCC V7.0 SP2 and earlier versions (All versions \u003c V7.0 SP2 Upd 12), SIMATIC WinCC V7.0 SP3 (All versions \u003c V7.0 SP3 Upd 8), SIMATIC WinCC V7.2 (All versions \u003c V7.2 Upd 14), SIMATIC WinCC V7.3 (All versions \u003c V7.3 Upd 11), SIMATIC WinCC V7.4 (All versions \u003c V7.4 SP1), SIMIT V9.0 (All versions \u003c V9.0 SP1), SINEMA Remote Connect Client (All versions \u003c V1.0 SP3), SINEMA Server (All versions \u003c V13 SP2), SOFTNET Security Client V5.0 (All versions), Security Configuration Tool (SCT) (All versions \u003c V4.3 HF1), TeleControl Server Basic (All versions \u003c V3.0 SP2), WinAC RTX 2010 SP2 (All versions), WinAC RTX F 2010 SP2 (All versions). Unquoted service paths could allow local Microsoft Windows operating system users to escalate their privileges if the affected products are not installed under their default path (\"C:\\Program Files\\*\" or the localized equivalent)." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en Primary Setup Tool (PST) (todas las versiones anteriores a V4.2 HF1), SIMATIC IT Production Suite (todas las versiones anteriores a V7.0 SP1 HFX 2), SIMATIC NET PC-Software (Todas las versiones anteriores a V14), SIMATIC PCS 7 versi\u00f3n V7.1 (Todas las versiones), SIMATIC PCS 7 versi\u00f3n V8.0 (Todas las versiones), SIMATIC PCS 7 versi\u00f3n V8.1 (Todas las versiones),SIMATIC PCS 7 versi\u00f3n V8.2 (Todas las versiones anteriores a V8.2 SP1), SIMATIC STEP 7 (TIA Portal) versi\u00f3n V13 (Todas las versiones anteriores a V13 SP2), SIMATIC STEP 7 versiones V5.X (Todas las versiones anteriores a V5.5 SP4 HF11), SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced (Todas las versiones anteriores a V14), SIMATIC WinCC (TIA Portal) Professional versi\u00f3n V13 (Todas las versiones anteriores a V13 SP2), SIMATIC WinCC (TIA Portal) Professional versi\u00f3n V14 (Todas las versiones anteriores a V14 SP1), SIMATIC WinCC Runtime Professional versi\u00f3n V13 (Todas las versiones anteriores a V13 SP2), SIMATIC WinCC Runtime Professional versi\u00f3n V14 (Todas las versiones anteriores a V14 SP1), SIMATIC WinCC versi\u00f3n V7.0 SP2 y anteriores (Todas las versiones anteriores a V7.0 SP2 Upd 12), SIMATIC WinCC versi\u00f3n V7.0 SP3 (Todas las versiones anteriores a V7.0 SP3 Upd 8), SIMATIC WinCC versi\u00f3n V7.2 (Todas las versiones anteriores a V7.2 Upd 14), SIMATIC WinCC versi\u00f3n V7.3 (Todas las versiones anteriores a V7.3 Upd 11), SIMATIC WinCC versi\u00f3n V7.4 (Todas las versiones anteriores a V7.4 SP1), SIMIT versi\u00f3n V9.0 (Todas las versiones anteriores a V9.0 SP1), SINEMA Remote Connect Client (Todas las versiones anteriores a V1.0 SP3), SINEMA Server (Todas las versiones anteriores a V13 SP2), SOFTNET Security Client versi\u00f3n V5.0 (Todas las versiones), Security Configuration Tool (SCT) (Todas las versiones anteriores a V4.3 HF1), TeleControl Server Basic (Todas las versiones anteriores a V3.0 SP2), WinAC RTX 2010 SP2 (Todas las versiones), WinAC RTX F 2010 SP2 (Todas las versiones). Las rutas (path) de servicio sin comillas podr\u00edan permitir que los usuarios locales del sistema operativo Microsoft Windows aumenten sus privilegios si los productos afectados no est\u00e1n instalados en su ruta (path) de acceso predeterminada (\"C:\\Program Files\\*\" o el equivalente localizado)." } ], "id": "CVE-2016-7165", "lastModified": "2024-11-21T02:57:37.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.5, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-11-15T19:30:02.797", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94158" }, { "source": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://securityaffairs.co/wordpress/53266/security/cve-2016-7165-siemens.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-701708.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-313-02" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-254" }, { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-07-24 14:55
Modified
2024-11-21 02:10
Severity ?
Summary
The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote authenticated users to gain privileges via a (1) HTTP or (2) HTTPS request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_pcs7 | * | |
siemens | simatic_pcs7 | 7.1 | |
siemens | simatic_pcs7 | 8.0 | |
siemens | wincc | * | |
siemens | wincc | 5.0 | |
siemens | wincc | 5.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 6.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.0 | |
siemens | wincc | 7.1 | |
siemens | wincc | 7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "0165209F-7378-4C05-9373-ECA6EA57697D", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "33FA164B-E269-4140-AC85-2623356AF636", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "matchCriteriaId": "74484B5D-121B-4838-9072-019532E78A03", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "111D0F4D-2B67-46E8-BF8D-5D30EFE561EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B16BB99-49E0-443E-BEE0-C7694D2C54E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "A4115260-50FC-40C9-81CF-4D9F97394627", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote authenticated users to gain privileges via a (1) HTTP or (2) HTTPS request." }, { "lang": "es", "value": "El servidor WebNavigator en Siemens SIMATIC WinCC anterior a 7.3, utilizado en PCS7 y otros productos, permite a usuarios remotos autenticados ganar privilegios a trav\u00e9s de una solicitud (1) HTTP o (2) HTTPS." } ], "id": "CVE-2014-4683", "lastModified": "2024-11-21T02:10:41.813", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-07-24T14:55:08.050", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-21 15:55
Modified
2024-11-21 01:47
Severity ?
Summary
Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not properly represent WebNavigator credentials in a database, which makes it easier for remote authenticated users to obtain sensitive information via a SQL query.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EFF12A0-B105-4225-B818-F858C75047B0", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "5AC094B0-B1BE-436D-A8D3-2008D0CDE070", "versionEndIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not properly represent WebNavigator credentials in a database, which makes it easier for remote authenticated users to obtain sensitive information via a SQL query." }, { "lang": "es", "value": "Siemens WinCC antes de v7,2, tal como se utiliza en SIMATIC PCS 7 antes de v8,0 SP1 y otros productos, no representa correctamente las credenciales WebNavigator en una base de datos, lo que hace que sea m\u00e1s f\u00e1cil para los usuarios remotos autenticados para obtener informaci\u00f3n sensible a trav\u00e9s de una consulta SQL." } ], "id": "CVE-2013-0678", "lastModified": "2024-11-21T01:47:59.673", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-21T15:55:01.600", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-09-18 14:55
Modified
2024-11-21 01:40
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to hijack the authentication of arbitrary users for requests that modify data or cause a denial of service.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B894F4-9635-4436-BC0A-E43280426017", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "5AC094B0-B1BE-436D-A8D3-2008D0CDE070", "versionEndIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CB277F-7ECB-4F44-8BB5-A3D350486EE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "616535F1-F609-408B-AE48-61ACF48748A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F322FCB-32F4-4C5A-A7F5-F7EF41188C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "69822DB4-DC79-4F88-A470-5AC512C77377", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "996DE8BD-DD51-41EF-9882-C2BD2CC5FE53", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "945C8B46-4CDA-4143-889C-30E30E93DB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A33F9015-7058-419A-8762-CB2AE4ACF1A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "E6271FCC-CCF6-4D31-801A-B4B0DC4639DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "DF7A6B2B-D573-4285-B3B4-136F2BE7E710", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to hijack the authentication of arbitrary users for requests that modify data or cause a denial of service." }, { "lang": "es", "value": "Una vulnerabilidad de falsificaci\u00f3n de peticiones en sitios cruzados (CSRF) en WebNavigator en Siemens WinCC v7.0 SP3 y versiones anteriores, tal como se utiliza en SIMATIC PCS v7 y otros productos, permite a atacantes remotos provocar una denegaci\u00f3n de servicio o secuestrar la autenticaci\u00f3n de usuarios de su elecci\u00f3n para las peticiones que modifican datos." } ], "id": "CVE-2012-3028", "lastModified": "2024-11-21T01:40:08.817", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-09-18T14:55:01.397", "references": [ { "source": "ics-cert@hq.dhs.gov", "url": "http://en.securitylab.ru/lab/PT-2012-42" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Patch" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "source": "ics-cert@hq.dhs.gov", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://en.securitylab.ru/lab/PT-2012-42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }