PT-2013-78: Buffer overflow in SIMATIC WinCC Open Architecture
Vulnerable platform
SIMATIC WinCC Open Architecture
Version: 3.12 and earlier
Link:
http://www.siemens.com/
Severity level
Severity level: High
Impact: Arbitrary Code Execution
Access Vector: Remote
CVSS v2:
Base Score: 9.3
Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE: CVE-2014-1697
Platform description
SIMATIC WinCC Open Architecture is a SCADA system for visualizing and operating processes, production flows, machines and plants in all lines of business.
Vulnerability description
The specialists of the Positive Research center have detected a Buffer overflow vulnerability in SIMATIC WinCC Open Architecture.
The SIMATIC WinCC OA integrated Web server at Port 4999/TCP might allow attackers to perform remote code execution by sending specially crafted packets without authentication.
How to fix
Update your software up to the latest version
Advisory status
01.12.2013 - Vendor gets vulnerability details
03.02.2014 - Vendor releases fixed version and details
14.02.2014 - Public disclosure
Credits
The vulnerability was detected by Kirill Nesterov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2013-78
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-342587.pdf
https://ics-cert.us-cert.gov/advisories/ICSA-14-035-01
Reports on the vulnerabilities previously discovered by Positive Research:
http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/