Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Please update your plant. On recent WinCC SCADA fixes
From: scadastrangelove <scadastrangelove () gmail com>
Date: Fri, 28 Jun 2013 00:02:39 +0400

Few days ago Siemens published update for WinCC 7.2 SCADA to fix several
vulnerabilities discovered by SCADA StrangeLove team.
CVE-2013-3957 – most dangers one. Simple SQL Injection because some
configuration and architectural issues an attacker can execute arbitrary
code in context of SQL server. This vulnerability can be exploited not only
via WebNavigator (e.g. HTTP), but via WinCC Runtime Client (e.g. OPC). So
Cisco Applied Mitigation Bulletin 29768
http://tools.cisco.com/security/center/viewAlert.x?alertId=29768 should be
fixed to filter OPC traffic also.

CVE-2013-3958 and CVE-2013-3959 is funny stuff because… Because  hardcoded
accounts are always funny.

Credits:
Alexander Tlyapov, Sergey Gordeychik and Timur Yunusov.

Links:
http://scadastrangelove.blogspot.com/2013/06/wincc-vulnerabilities-fixes.html
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
  • Please update your plant. On recent WinCC SCADA fixes scadastrangelove (Jun 27)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]