PT-2013-77: Using a weak hashing algorithm in SIMATIC WinCC Open Architecture Vulnerable platformSIMATIC WinCC Open Architecture Version: 3.12 and earlierLink: http://www.siemens.com/Severity levelSeverity level: High Impact: Privilege Gaining Access Vector: Remote CVSS v2: Base Score: 7.5 Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)CVE: CVE-2014-1696Platform descriptionSIMATIC WinCC Open Architecture is a SCADA system for visualizing and operating processes, production flows, machines and plants in all lines of business.Vulnerability descriptionThe specialists of the Positive Research center have detected an Using a weak hashing algorithm vulnerability in SIMATIC WinCC Open Architecture.The SIMATIC WinCC OA server application has a weak hashing algorithm for project users’ credentials. Attackers might be able to escalate their privileges within the affected WinCC OA server application using a brute-force attack.How to fixUpdate your software up to the latest versionAdvisory status 29.05.2013 - Vendor gets vulnerability details 03.02.2014 - Vendor releases fixed version and details 14.02.2014 - Public disclosureCreditsThe vulnerability was detected by Gleb Gritsai and Ilya Karpov, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2013-77 http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-342587.pdf https://ics-cert.us-cert.gov/advisories/ICSA-14-035-01 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/