PT-2013-78: Buffer overflow in SIMATIC WinCC Open Architecture

Vulnerable platform

SIMATIC WinCC Open Architecture
Version: 3.12 and earlier

Link:
http://www.siemens.com/

Severity level

Severity level: High
Impact: Arbitrary Code Execution
Access Vector: Remote

CVSS v2:
Base Score: 9.3
Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVE: CVE-2014-1697

Platform description

SIMATIC WinCC Open Architecture is a SCADA system for visualizing and operating processes, production flows, machines and plants in all lines of business.

Vulnerability description

The specialists of the Positive Research center have detected a Buffer overflow vulnerability in SIMATIC WinCC Open Architecture.

The SIMATIC WinCC OA integrated Web server at Port 4999/TCP might allow attackers to perform remote code execution by sending specially crafted packets without authentication.

How to fix

Update your software up to the latest version

Advisory status

01.12.2013 - Vendor gets vulnerability details
03.02.2014 - Vendor releases fixed version and details
14.02.2014 - Public disclosure

Credits

The vulnerability was detected by Kirill Nesterov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2013-78
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-342587.pdf
https://ics-cert.us-cert.gov/advisories/ICSA-14-035-01

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape
4G and 5G are not ready for smart cities