PT-2012-11: Multiple Cross-Site Scripting in WinCC (SCADA) Vulnerable softwareWinCC Version: 7.0 SP3 before Update 2 and earlierApplication link: http://www.siemens.com/Severity levelSeverity level: Medium Impact: Cross-Site Scripting Access Vector: Network exploitable CVSS v2: Base Score: 4.3 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)CVE: CVE-2012-2595 Software descriptionSimatic WinCC is a part of Siemens SIMATIC HMI software that aimed to provide connection between an operator and PLCs that manage technological processes. SIMATIC HMI is responsible for technical process visualization, alarm system, process assessment and error logging, and also manages device parameters. The software is used in a number of industries including food, oil, gas, chemical, power industries.Vulnerability descriptionThe specialists of the Positive Research center have a vulnerability detected "Cross-Site Scripting" in WinCC.WinCC web application is vulnerable to reversed cross-site scripting. An attacker can get an unauthenticated access to web application components.How to fixUpdate your software up to the latest versionAdvisory status23.05.2012 - Vendor is notified 23.05.2012 - Vendor gets vulnerability details 05.06.2012 - Vendor releases fixed version and details 20.06.2012 - Public disclosureCreditsThe vulnerability was discovered by Sergey Scherbel, Yury Goltsev, Dmitry Serebryannikov, Sergey Bobrov, Denis Baranov, Andrey Medov, Artem Chaykin, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2012-11 http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdf Reports on the vulnerabilities previously discovered by Positive Research:http://ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/