PT-2012-43: Arbitrary Files Reading in Siemens Simatic WinCC WebNavigator

Vulnerable software

Siemens Simatic WinCC WebNavigator
Version: 7.0 SP3 and earlier

Application link:
http://www.siemens.com/

Severity level

Severity level: Medium
Impact: Arbitrary Files Reading
Access Vector: Remote  

CVSS v2:
Base Score: 5.0
Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE: CVE-2012-3030

Software description

Simatic WinCC is a part of Siemens SIMATIC HMI software that aimed to provide connection between an operator and PLCs that manage technological processes. The WebNavigator component of WinCC gives the users the possibility to control their plants via the web browser with the same look-and-feel like local operator stations.

Vulnerability description

The specialists of the Positive Research center have detected "Arbitrary Files Reading" vulnerability in Siemens Simatic WinCC WebNavigator.

Arbitrary file reading over the web interface was possible on the web folder on certain directories and files. An attacker with access to the WebNavigator web server can read data like log files and configuration files, which might have sensitive content.

How to fix

Update your software up to the latest version

Advisory status

16.07.2012 - Vendor is notified
16.07.2012 - Vendor gets vulnerability details
10.09.2012 - Vendor releases fixed version and details
13.09.2012 - Public disclosure

Credits

The vulnerability was discovered by Sergey Bobrov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2012-43
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape
4G and 5G are not ready for smart cities