The following cyber advisory was issued by the New York State Office of Information Technology Services and is intended for State government entities. The information may or may not be applicable to the general public and, accordingly, the State does not warrant its use for any specific purposes.



Multiple Security Vulnerabilities Reported in Siemens SIMATIC WinCC


Multiple vulnerabilities have been discovered in the Siemen's Supervisory Control and Data Acquisition (SCADA) system. SIMATIC WinCC is a SCADA system that is used to monitor and control physical processes involved in industry and infrastructure. This software is used in many industries, including food and beverage, water and wastewater, oil and gas, and chemical. Successful exploitation of these vulnerabilities could allow an attacker access to sensitive information or allow a user to gain privileges.  Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.


  • All versions of SIMATIC WinCC prior to version 7.3
  • All versions of SIMATIC PCS7 (as WinCC is incorporated) prior to version 8.1


  • Large and medium government entities: High
  • Small government entities: High


  • Large and medium business entities: High
  • Small business entities: High

Home users: N/A

Multiple vulnerabilities have been discovered in SIMATIC WinCC.  Details of these vulnerabilities are as follows:

  • An unauthenticated remote attacker could obtain sensitive information via a specially crafted HTTP or HTTPS request to the SIMATIC WinCC WebNavigator server. [CVE-2014-4682]
  • A remote authenticated user could escalate their privileges without authorization via the existing access control settings. [CVE-2014-4683]
  • A remote authenticated user could escalate their privileges in the SIMATIC WinCC database without authorization via a specially crafted request to TCP port 1433. [CVE-2014-4684]
  • A local user could obtain limited escalated privileges within the operating system by leveraging a weak system-object access control. [CVE-2014-4685]
  • An unauthorized disclosure of information is caused by a hard-coded cryptographic key. This could allow for an escalation of privileges if network communication on TCP port 1030 for a legitimate user is captured.  [CVE-2014-4686]

We recommend the following actions be taken:

  • Update vulnerable systems immediately after appropriate testing
  • Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs).  Please note that VPNs may have vulnerabilities and should be updated to the most current version available and are only as secure as the connected devices.

Security Focus:



Deborah A. Snyder

Acting Chief Information Security Officer


Cyber Security