ITS ADVISORY NUMBER:
Multiple Security Vulnerabilities Reported in Siemens SIMATIC WinCC
Multiple vulnerabilities have been discovered in the Siemen's Supervisory Control and Data Acquisition (SCADA) system. SIMATIC WinCC is a SCADA system that is used to monitor and control physical processes involved in industry and infrastructure. This software is used in many industries, including food and beverage, water and wastewater, oil and gas, and chemical. Successful exploitation of these vulnerabilities could allow an attacker access to sensitive information or allow a user to gain privileges. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- All versions of SIMATIC WinCC prior to version 7.3
- All versions of SIMATIC PCS7 (as WinCC is incorporated) prior to version 8.1
- Large and medium government entities: High
- Small government entities: High
- Large and medium business entities: High
- Small business entities: High
Home users: N/A
Multiple vulnerabilities have been discovered in SIMATIC WinCC. Details of these vulnerabilities are as follows:
- An unauthenticated remote attacker could obtain sensitive information via a specially crafted HTTP or HTTPS request to the SIMATIC WinCC WebNavigator server. [CVE-2014-4682]
- A remote authenticated user could escalate their privileges without authorization via the existing access control settings. [CVE-2014-4683]
- A remote authenticated user could escalate their privileges in the SIMATIC WinCC database without authorization via a specially crafted request to TCP port 1433. [CVE-2014-4684]
- A local user could obtain limited escalated privileges within the operating system by leveraging a weak system-object access control. [CVE-2014-4685]
- An unauthorized disclosure of information is caused by a hard-coded cryptographic key. This could allow for an escalation of privileges if network communication on TCP port 1030 for a legitimate user is captured. [CVE-2014-4686]
We recommend the following actions be taken:
- Update vulnerable systems immediately after appropriate testing
- Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.
- Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Please note that VPNs may have vulnerabilities and should be updated to the most current version available and are only as secure as the connected devices.
Acting Chief Information Security Officer
- EISO Home
- Incident Reporting
- Breach Notification
- Cyber Advisories
- NYS Digital Forensics
- Cyber Tips Newsletter
- Keeping Kids Safe Online
- Local Government
- Policies and Resources
- NY-ISAC Secure Portal
- Contact EISO