PT-2013-80: Improper input validation in SIMATIC WinCC Open Architecture Vulnerable platformSIMATIC WinCC Open Architecture Version: 3.12 and earlierLink: http://www.siemens.com/Severity levelSeverity level: Medium Impact: Denial of Service Access Vector: Remote CVSS v2: Base Score: 5.0 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)CVE: CVE-2014-1699Platform descriptionSIMATIC WinCC Open Architecture is a SCADA system for visualizing and operating processes, production flows, machines and plants in all lines of business.Vulnerability descriptionThe specialists of the Positive Research center have detected an Improper input validation vulnerability in SIMATIC WinCC Open Architecture.The SIMATIC WinCC OA integrated Web server at Port 4999/TCP might allow attackers to perform a denial of service attack on the SIMATIC WinCC OA monitoring service by sending malformed HTTP requests over the network without authentication. Restarting the WinCC OA Console recovers the monitoring service.How to fixUpdate your software up to the latest versionAdvisory status 01.12.2013 - Vendor gets vulnerability details 03.02.2014 - Vendor releases fixed version and details 14.02.2014 - Public disclosureCreditsThe vulnerability was detected by Gleb Gritsai and Kirill Nesterov, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2013-80 http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-342587.pdf https://ics-cert.us-cert.gov/advisories/ICSA-14-035-01 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/