var-201306-0316
Vulnerability from variot
The Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, exhibits different behavior for NetBIOS user names depending on whether the user account exists, which allows remote authenticated users to enumerate account names via crafted URL parameters. Siemens SIMATIC WinCC is a monitoring control and data acquisition SCADA and human machine interface HMI system. Siemens SIMATIC PCS is a process control system. Siemens SIMATIC WinCC And PCS 7 are prone to a username-enumeration weakness because of a design error in the application when verifying user-supplied input. Attackers may exploit this weakness to discern valid usernames. This may aid brute-force password cracking or other attacks. There is a vulnerability in the Web Navigator in Siemens WinCC 7.2 Update 1 and earlier versions used in SIMATIC PCS7 8.0 SP1 and earlier versions and other products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0316", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wincc", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "7.0" }, { "model": "wincc", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "7.1" }, { "model": "simatic pcs7", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "8.0" }, { "model": "simatic pcs7", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "8.0" }, { "model": "wincc", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "7.2" }, { "model": null, "scope": "eq", "trust": 0.8, "vendor": "wincc", "version": "7.0" }, { "model": "simatic pcs 7", "scope": "lte", "trust": 0.8, "vendor": "siemens", "version": "8.0 sp1" }, { "model": "simatic wincc", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "7.2 update 1" }, { "model": "simatic wincc", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "7.x" }, { "model": "simatic pcs", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "78.x" }, { "model": "wincc", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "7.2" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "wincc", "version": "7.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic pcs7", "version": "8.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic pcs7", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "wincc", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e694e1ea-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-07608" }, { "db": "JVNDB", "id": "JVNDB-2013-002984" }, { "db": "NVD", "id": "CVE-2013-3959" }, { "db": "CNNVD", "id": "CNNVD-201306-249" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:wincc:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:wincc:7.1:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_pcs7:*:sp1:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-3959" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alexander Tlyapov from Positive Technologies", "sources": [ { "db": "BID", "id": "60559" } ], "trust": 0.3 }, "cve": "CVE-2013-3959", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2013-3959", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CNVD-2013-07608", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "e694e1ea-2352-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-63961", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-3959", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2013-07608", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201306-249", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "e694e1ea-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-63961", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e694e1ea-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-07608" }, { "db": "VULHUB", "id": "VHN-63961" }, { "db": "JVNDB", "id": "JVNDB-2013-002984" }, { "db": "NVD", "id": "CVE-2013-3959" }, { "db": "CNNVD", "id": "CNNVD-201306-249" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, exhibits different behavior for NetBIOS user names depending on whether the user account exists, which allows remote authenticated users to enumerate account names via crafted URL parameters. Siemens SIMATIC WinCC is a monitoring control and data acquisition SCADA and human machine interface HMI system. Siemens SIMATIC PCS is a process control system. Siemens SIMATIC WinCC And PCS 7 are prone to a username-enumeration weakness because of a design error in the application when verifying user-supplied input. \nAttackers may exploit this weakness to discern valid usernames. This may aid brute-force password cracking or other attacks. There is a vulnerability in the Web Navigator in Siemens WinCC 7.2 Update 1 and earlier versions used in SIMATIC PCS7 8.0 SP1 and earlier versions and other products", "sources": [ { "db": "NVD", "id": "CVE-2013-3959" }, { "db": "JVNDB", "id": "JVNDB-2013-002984" }, { "db": "CNVD", "id": "CNVD-2013-07608" }, { "db": "BID", "id": "60559" }, { "db": "IVD", "id": "e694e1ea-2352-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-63961" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3959", "trust": 3.6 }, { "db": "SIEMENS", "id": "SSA-345843", "trust": 2.0 }, { "db": "SECUNIA", "id": "53805", "trust": 1.2 }, { "db": "ICS CERT", "id": "ICSA-13-169-02", "trust": 1.1 }, { "db": "BID", "id": "60559", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201306-249", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2013-07608", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-002984", "trust": 0.8 }, { "db": "IVD", "id": "E694E1EA-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-63961", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e694e1ea-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-07608" }, { "db": "VULHUB", "id": "VHN-63961" }, { "db": "BID", "id": "60559" }, { "db": "JVNDB", "id": "JVNDB-2013-002984" }, { "db": "NVD", "id": "CVE-2013-3959" }, { "db": "CNNVD", "id": "CNNVD-201306-249" } ] }, "id": "VAR-201306-0316", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e694e1ea-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-07608" }, { "db": "VULHUB", "id": "VHN-63961" } ], "trust": 1.49052891 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e694e1ea-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-07608" } ] }, "last_update_date": "2023-12-18T13:09:31.178000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-345843: Vulnerabilites in WinCC 7.2", "trust": 0.8, "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" }, { "title": "Siemens SIMATIC WinCC/PCS 7 User Name Enumeration Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/34668" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07608" }, { "db": "JVNDB", "id": "JVNDB-2013-002984" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63961" }, { "db": "JVNDB", "id": "JVNDB-2013-002984" }, { "db": "NVD", "id": "CVE-2013-3959" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345843.pdf" }, { "trust": 1.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-13-169-02" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3959" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3959" }, { "trust": 0.6, "url": "http://secunia.com/advisories/53805/" }, { "trust": 0.6, "url": "http://secunia.com/advisories/53805" }, { "trust": 0.3, "url": "http://www.siemens.com/" }, { "trust": 0.3, "url": "http://www.automation.siemens.com/mcms/human-machine-interface/en/visualization-software/scada/simatic-wincc/pages/default.aspx" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07608" }, { "db": "VULHUB", "id": "VHN-63961" }, { "db": "BID", "id": "60559" }, { "db": "JVNDB", "id": "JVNDB-2013-002984" }, { "db": "NVD", "id": "CVE-2013-3959" }, { "db": "CNNVD", "id": "CNNVD-201306-249" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e694e1ea-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-07608" }, { "db": "VULHUB", "id": "VHN-63961" }, { "db": "BID", "id": "60559" }, { "db": "JVNDB", "id": "JVNDB-2013-002984" }, { "db": "NVD", "id": "CVE-2013-3959" }, { "db": "CNNVD", "id": "CNNVD-201306-249" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-19T00:00:00", "db": "IVD", "id": "e694e1ea-2352-11e6-abef-000c29c66e3d" }, { "date": "2013-06-19T00:00:00", "db": "CNVD", "id": "CNVD-2013-07608" }, { "date": "2013-06-14T00:00:00", "db": "VULHUB", "id": "VHN-63961" }, { "date": "2013-06-14T00:00:00", "db": "BID", "id": "60559" }, { "date": "2013-06-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002984" }, { "date": "2013-06-14T19:55:01.270000", "db": "NVD", "id": "CVE-2013-3959" }, { "date": "2013-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-249" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-19T00:00:00", "db": "CNVD", "id": "CNVD-2013-07608" }, { "date": "2013-06-17T00:00:00", "db": "VULHUB", "id": "VHN-63961" }, { "date": "2015-03-19T09:11:00", "db": "BID", "id": "60559" }, { "date": "2013-06-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002984" }, { "date": "2013-06-17T04:00:00", "db": "NVD", "id": "CVE-2013-3959" }, { "date": "2013-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-249" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-249" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SIMATIC WinCC/PCS 7 User Name Enumeration Vulnerability", "sources": [ { "db": "IVD", "id": "e694e1ea-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-07608" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-249" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.