PT-2013-27: Directory Traversal in Siemens Simatic WinCC and PCS 7
Vulnerable software
Siemens Simatic WinCC
Version: 7.0 SP3 and earlier
Siemens Simatic PCS 7
Version: 8.0 and earlier
Application link:
http://www.siemens.com/
Severity level
Severity level: Medium
Impact: Arbitrary Files Reading
Access Vector: Remote
CVSS v2:
Base Score: 4.0
Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVE: CVE-2013-0679
Software description
Simatic WinCC is a part of Siemens SIMATIC HMI software that aimed to provide connection between an operator and PLCs that manage technological processes.
Vulnerability description
The specialists of the Positive Research center have detected "Directory Traversal" vulnerability in Siemens Simatic WinCC and PCS 7.
Authenticated users may manipulate the URL in the web browser to access the file system of the web server. With this vulnerability they may read all the files that are readable in the web server context.
How to fix
Update your software up to the latest version
Advisory status
11.07.2012 - Vendor gets vulnerability details
15.03.2013 - Vendor releases fixed version and details
29.03.2013 - Public disclosure
Credits
The vulnerability was discovered by Sergey Bobrov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2013-27
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/