PT-2013-79: Relative path traversal in SIMATIC WinCC Open Architecture
Vulnerable platform
SIMATIC WinCC Open Architecture
Version: 3.12 and earlier
Link:
http://www.siemens.com/
Severity level
Severity level: Medium
Impact: Access to Sensitive Information
Access Vector: Remote
CVSS v2:
Base Score: 5.0
Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE: CVE-2014-1698
Platform description
SIMATIC WinCC Open Architecture is a SCADA system for visualizing and operating processes, production flows, machines and plants in all lines of business.
Vulnerability description
The specialists of the Positive Research center have detected a Relative path traversal vulnerability in SIMATIC WinCC Open Architecture.
The SIMATIC WinCC OA integrated Web server at Port 4999/TCP might allow attackers to traverse through the server’s file system based on the application’s Windows user permissions by sending specially crafted packets over the network without authentication.
How to fix
Update your software up to the latest version
Advisory status
01.12.2013 - Vendor gets vulnerability details
03.02.2014 - Vendor releases fixed version and details
14.02.2014 - Public disclosure
Credits
The vulnerability was detected by Kirill Nesterov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2013-79
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-342587.pdf
https://ics-cert.us-cert.gov/advisories/ICSA-14-035-01
Reports on the vulnerabilities previously discovered by Positive Research:
http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/