PT-2013-28: Buffer Overflow in Siemens Simatic WinCC and PCS 7

Vulnerable software

Siemens Simatic WinCC
Version: 7.0 SP3 and earlier

Siemens Simatic PCS 7
Version: 8.0 and earlier

Application link:
http://www.siemens.com/

Severity level

Severity level: Medium
Impact: Arbitrary Code Execution
Access Vector: Remote  

CVSS v2:
Base Score: 6.8
Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVE: CVE-2013-0674

Software description

Simatic WinCC is a part of Siemens SIMATIC HMI software that aimed to provide connection between an operator and PLCs that manage technological processes.

Vulnerability description

The specialists of the Positive Research center have detected "Buffer Overflow" vulnerability in Siemens Simatic WinCC and PCS 7.

An ActiveX control "RegReader", which is installed in the user’s web browser, is susceptible to a buffer overflow. An attacker might trick a victim into visiting a malicious web site, which calls this ActiveX control, triggers the overflow, and take over the victim’s PC.

How to fix

Update your software up to the latest version

Advisory status

02.08.2012 - Vendor gets vulnerability details
15.03.2013 - Vendor releases fixed version and details
29.03.2013 - Public disclosure

Credits

The vulnerability was discovered by Gleb Gritsai, Dmitry Nagibin,Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2013-28
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/