Multiple security vulnerabilities in Siemens SIMATIC WinCC

Source: Internet
Author: User

Release date:
Updated on:

Affected Systems:
Siemens SIMATIC WinCC Flexible
Description:
--------------------------------------------------------------------------------
Bugtraq id: 55492
Cve id: CVE-2012-3030, CVE-2012-3031, CVE-2012-3032, CVE-2012-3034

WinCC flexible is a human-machine interface used in some machine or process applications.

Siemens SIMATIC WinCC 7.0 SP3 and earlier versions have multiple security vulnerabilities. Malicious users can exploit these vulnerabilities to perform XSS attacks, SQL injection attacks, and sensitive information leakage.

1) Some inputs sent to the WebNavigator component are not filtered correctly before being returned to the user. Attackers can execute arbitrary HTML and script code in the user's browser of the affected site.

2) some inputs sent to the WebNavigator component are not correctly verified before being used to read files. Directory traversal can cause information leakage.

3) Some inputs sent to the WebNavigator component through SOAP messages are not correctly verified before being used for SQL queries. You can run SQL queries by injecting SQL code.

4) An error exists in the ActiveX control, which can be exploited to leak the authenticated user name and password.

<* Source: Denis Baranov Sergey Bobrov

Link: http://secunia.com/advisories/50568/
*>

Suggestion:
--------------------------------------------------------------------------------
Vendor patch:

Siemens
-------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:

Http://www.automation.siemens.com/mcms/automation/en/

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.