Vulnerabilites related to siemens - simatic_hmi_panels
Vulnerability from fkie_nvd
Published
2012-02-03 20:55
Modified
2024-11-21 01:32
Severity ?
Summary
CRLF injection vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | wincc_flexible | 2004 | |
siemens | wincc_flexible | 2005 | |
siemens | wincc_flexible | 2007 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc | * | |
siemens | wincc | v11 | |
siemens | wincc | v11 | |
siemens | simatic_hmi_panels | comfort_panels | |
siemens | simatic_hmi_panels | mobile_panels | |
siemens | simatic_hmi_panels | mp | |
siemens | simatic_hmi_panels | op | |
siemens | simatic_hmi_panels | tp | |
siemens | wincc_runtime_advanced | v11 | |
siemens | wincc_flexible_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*", "matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*", "matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:sp1:*:*:*:*:*:*", "matchCriteriaId": "1A4B1323-9AF3-424F-925A-A62F35E575E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:sp2:*:*:*:*:*:*", "matchCriteriaId": "E454C72B-7804-402B-9C6A-687BF2C45D39", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9FE44373-06BD-4AA0-8778-06F2A150510C", "versionEndIncluding": "v11", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*", "matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:v11:sp1:*:*:*:*:*:*", "matchCriteriaId": "F53FDA20-FE97-4BA3-9165-F0BD7A25FA5F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*", "matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*", "matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*", "matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*", "matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*", "matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CRLF injection vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n CRLF en el servidor web HMI de Siemens WinCC flexible 2004, 2005, 2007 y 2008 anteriores a SP3; WinCC V11 (TIA portal) anteriores a SP2 Update 1; TP, OP, MP, Comfort Panels y Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; y WinCC flexible Runtime permite a atacantes remotos inyectar cabeceras HTTP arbitrarios y realizar ataques de divisi\u00f3n de respuesta HTTP a trav\u00e9s de vectores sin especificar." } ], "id": "CVE-2011-4512", "lastModified": "2024-11-21T01:32:27.243", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-03T20:55:01.453", "references": [ { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-03 20:55
Modified
2024-11-21 01:32
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4511.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | wincc_flexible | 2004 | |
siemens | wincc_flexible | 2005 | |
siemens | wincc_flexible | 2007 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc | * | |
siemens | wincc | v11 | |
siemens | wincc | v11 | |
siemens | simatic_hmi_panels | comfort_panels | |
siemens | simatic_hmi_panels | mobile_panels | |
siemens | simatic_hmi_panels | mp | |
siemens | simatic_hmi_panels | op | |
siemens | simatic_hmi_panels | tp | |
siemens | wincc_runtime_advanced | v11 | |
siemens | wincc_flexible_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*", "matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*", "matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:sp1:*:*:*:*:*:*", "matchCriteriaId": "1A4B1323-9AF3-424F-925A-A62F35E575E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:sp2:*:*:*:*:*:*", "matchCriteriaId": "E454C72B-7804-402B-9C6A-687BF2C45D39", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9FE44373-06BD-4AA0-8778-06F2A150510C", "versionEndIncluding": "v11", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*", "matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:v11:sp1:*:*:*:*:*:*", "matchCriteriaId": "F53FDA20-FE97-4BA3-9165-F0BD7A25FA5F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*", "matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*", "matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*", "matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*", "matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*", "matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4511." }, { "lang": "es", "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en el servidor web HMI en Siemens WinCC flexible v2004, v2005, v2007 y v2008 antes de SP3, WinCC V11 (tambi\u00e9n conocido como TIA Portal) antes de SP2 Update 1, el TP, OP, MP, Comfort Panels, y los paneles de Mobile Panels SIMATIC HMI, WinCC V11 Runtime Advanced, y WinCC flexible Runtime, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente a CVE-2011-4511." } ], "id": "CVE-2011-4510", "lastModified": "2024-11-21T01:32:27.010", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-02-03T20:55:01.343", "references": [ { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-03 20:55
Modified
2024-11-21 01:33
Severity ?
Summary
Stack-based buffer overflow in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute arbitrary code via vectors related to Unicode strings.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | wincc_flexible | 2004 | |
siemens | wincc_flexible | 2005 | |
siemens | wincc_flexible | 2007 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc | v11 | |
siemens | simatic_hmi_panels | comfort_panels | |
siemens | simatic_hmi_panels | mobile_panels | |
siemens | simatic_hmi_panels | mp | |
siemens | simatic_hmi_panels | op | |
siemens | simatic_hmi_panels | tp | |
siemens | wincc_runtime_advanced | v11 | |
siemens | wincc_flexible_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*", "matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*", "matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*", "matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*", "matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*", "matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*", "matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*", "matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*", "matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute arbitrary code via vectors related to Unicode strings." }, { "lang": "es", "value": "Desbordamiento de buffer de pila en HmiLoad del cargador de tiempo de ejecuci\u00f3n de Siemens WinCC flexible 2004, 2005, 2007, y 2008; WinCC V11 (TIA portal); TP, OP, MP, Comfort Panels y Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; y WinCC flexible Runtime, cuando el modo de transferencia (\"Transfer Mode\") est\u00e1 habilitado, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores relacionados con cadenas de texto Unicode." } ], "id": "CVE-2011-4875", "lastModified": "2024-11-21T01:33:10.353", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-03T20:55:01.907", "references": [ { "source": "cret@cert.org", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "source": "cret@cert.org", "url": "http://www.exploit-db.com/exploits/18166" }, { "source": "cret@cert.org", "url": "http://www.osvdb.org/77380" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "cret@cert.org", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "source": "cret@cert.org", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "cret@cert.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/18166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/77380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71449" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-03 20:55
Modified
2024-11-21 01:33
Severity ?
Summary
miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not properly handle URIs beginning with a 0xfa character, which allows remote attackers to read data from arbitrary memory locations or cause a denial of service (application crash) via a crafted POST request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | wincc_flexible | 2004 | |
siemens | wincc_flexible | 2005 | |
siemens | wincc_flexible | 2007 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc | * | |
siemens | wincc | v11 | |
siemens | wincc | v11 | |
siemens | simatic_hmi_panels | comfort_panels | |
siemens | simatic_hmi_panels | mobile_panels | |
siemens | simatic_hmi_panels | mp | |
siemens | simatic_hmi_panels | op | |
siemens | simatic_hmi_panels | tp | |
siemens | wincc_runtime_advanced | v11 | |
siemens | wincc_flexible_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*", "matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*", "matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:sp1:*:*:*:*:*:*", "matchCriteriaId": "1A4B1323-9AF3-424F-925A-A62F35E575E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:sp2:*:*:*:*:*:*", "matchCriteriaId": "E454C72B-7804-402B-9C6A-687BF2C45D39", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9FE44373-06BD-4AA0-8778-06F2A150510C", "versionEndIncluding": "v11", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*", "matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:v11:sp1:*:*:*:*:*:*", "matchCriteriaId": "F53FDA20-FE97-4BA3-9165-F0BD7A25FA5F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*", "matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*", "matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*", "matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*", "matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*", "matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not properly handle URIs beginning with a 0xfa character, which allows remote attackers to read data from arbitrary memory locations or cause a denial of service (application crash) via a crafted POST request." }, { "lang": "es", "value": "miniweb.exe del servidor web HMI de Siemens WinCC flexible 2004, 2005, 2007 y 2008 anteriores a SP3; WinCC V11 (portal TIA) anteriores a SP2 Update 1; los TP, OP, MP, Comfort Panels y Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; y WinCC flexible Runtime no manejan apropiadamente URIs que comienzan con un caracter 0xfa, lo que permite a atacantes remotos leer localizaciones de memoria arbitrarias o provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de una petici\u00f3n POST." } ], "id": "CVE-2011-4879", "lastModified": "2024-11-21T01:33:12.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 7.8, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-03T20:55:02.077", "references": [ { "source": "cret@cert.org", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "source": "cret@cert.org", "url": "http://www.exploit-db.com/exploits/18166" }, { "source": "cret@cert.org", "url": "http://www.osvdb.org/77384" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "cret@cert.org", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "source": "cret@cert.org", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "cret@cert.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/18166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/77384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71453" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-03 20:55
Modified
2024-11-21 01:32
Severity ?
Summary
The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime generates predictable authentication tokens for cookies, which makes it easier for remote attackers to bypass authentication via a crafted cookie.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | wincc_flexible | 2004 | |
siemens | wincc_flexible | 2005 | |
siemens | wincc_flexible | 2007 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc | * | |
siemens | wincc | v11 | |
siemens | wincc | v11 | |
siemens | simatic_hmi_panels | comfort_panels | |
siemens | simatic_hmi_panels | mobile_panels | |
siemens | simatic_hmi_panels | mp | |
siemens | simatic_hmi_panels | op | |
siemens | simatic_hmi_panels | tp | |
siemens | wincc_runtime_advanced | v11 | |
siemens | wincc_flexible_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*", "matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*", "matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:sp1:*:*:*:*:*:*", "matchCriteriaId": "1A4B1323-9AF3-424F-925A-A62F35E575E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:sp2:*:*:*:*:*:*", "matchCriteriaId": "E454C72B-7804-402B-9C6A-687BF2C45D39", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9FE44373-06BD-4AA0-8778-06F2A150510C", "versionEndIncluding": "v11", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*", "matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:v11:sp1:*:*:*:*:*:*", "matchCriteriaId": "F53FDA20-FE97-4BA3-9165-F0BD7A25FA5F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*", "matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*", "matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*", "matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*", "matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*", "matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime generates predictable authentication tokens for cookies, which makes it easier for remote attackers to bypass authentication via a crafted cookie." }, { "lang": "es", "value": "El servidor web HMI de Siemens WinCC flexible v2004, v2005, v2007 y v2008 antes de SP3, WinCC V11 (tambi\u00e9n conocido como TIA Portal) antes de SP2 Update 1, TP, OP, MP, Comfort Panels, y de los paneles de Mobile Panels SIMATIC HMI, WinCC V11 Advanced Runtime, y WinCC flexible Runtime genera tokens de autenticaci\u00f3n para cookies, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes remotos a la hora de evitar la autenticaci\u00f3n usando una cookie manipulada." } ], "id": "CVE-2011-4508", "lastModified": "2024-11-21T01:32:26.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-03T20:55:01.250", "references": [ { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-03 20:55
Modified
2024-11-21 01:32
Severity ?
Summary
The TELNET daemon in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not perform authentication, which makes it easier for remote attackers to obtain access via a TCP session.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | wincc_flexible | 2004 | |
siemens | wincc_flexible | 2005 | |
siemens | wincc_flexible | 2007 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc | v11 | |
siemens | simatic_hmi_panels | comfort_panels | |
siemens | simatic_hmi_panels | mobile_panels | |
siemens | simatic_hmi_panels | mp | |
siemens | simatic_hmi_panels | op | |
siemens | simatic_hmi_panels | tp | |
siemens | wincc_runtime_advanced | v11 | |
siemens | wincc_flexible_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*", "matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*", "matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*", "matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*", "matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*", "matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*", "matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*", "matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*", "matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TELNET daemon in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not perform authentication, which makes it easier for remote attackers to obtain access via a TCP session." }, { "lang": "es", "value": "El demonio TELNET de Siemens WinCC flexible 2004, 2005, 2007 y 2008; WinCC V11 (TIA portal); TP, OP, MP, Comfort Panels y Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; y WinCC flexible Runtime no realiza autenticaci\u00f3n, lo que facilita a atacantes remotos obtener acceso obtener acceso a trav\u00e9s de una sesi\u00f3n TCP." } ], "id": "CVE-2011-4514", "lastModified": "2024-11-21T01:32:27.483", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-03T20:55:01.577", "references": [ { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-03 20:55
Modified
2024-11-21 01:33
Severity ?
Summary
HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to cause a denial of service (application crash) by sending crafted data over TCP.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | wincc_flexible | 2004 | |
siemens | wincc_flexible | 2005 | |
siemens | wincc_flexible | 2007 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc | v11 | |
siemens | simatic_hmi_panels | comfort_panels | |
siemens | simatic_hmi_panels | mobile_panels | |
siemens | simatic_hmi_panels | mp | |
siemens | simatic_hmi_panels | op | |
siemens | simatic_hmi_panels | tp | |
siemens | wincc_runtime_advanced | v11 | |
siemens | wincc_flexible_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*", "matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*", "matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*", "matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*", "matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*", "matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*", "matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*", "matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*", "matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to cause a denial of service (application crash) by sending crafted data over TCP." }, { "lang": "es", "value": "HmiLoad del cargador en tiempo de ejecuci\u00f3n (\"runtime loader\") de Siemens WinCC flexible 2004, 2005, 2007 y 2008; WinCC V11 (TIA portal); the TP, OP, MP, Comfort Panels y Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced y WinCC flexible Runtime, cuando el modo de transferencia (\"Transfer Mode\") est\u00e1 habilitado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) enviando datos modificados sobre TCP." } ], "id": "CVE-2011-4877", "lastModified": "2024-11-21T01:33:11.390", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-03T20:55:01.983", "references": [ { "source": "cret@cert.org", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "source": "cret@cert.org", "url": "http://www.exploit-db.com/exploits/18166" }, { "source": "cret@cert.org", "url": "http://www.osvdb.org/77382" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "cret@cert.org", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "source": "cret@cert.org", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "cret@cert.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/18166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/77382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71451" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-03 20:55
Modified
2024-11-21 01:32
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4510.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | wincc_flexible | 2004 | |
siemens | wincc_flexible | 2005 | |
siemens | wincc_flexible | 2007 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc | * | |
siemens | wincc | v11 | |
siemens | wincc | v11 | |
siemens | simatic_hmi_panels | comfort_panels | |
siemens | simatic_hmi_panels | mobile_panels | |
siemens | simatic_hmi_panels | mp | |
siemens | simatic_hmi_panels | op | |
siemens | simatic_hmi_panels | tp | |
siemens | wincc_runtime_advanced | v11 | |
siemens | wincc_flexible_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*", "matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*", "matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:sp1:*:*:*:*:*:*", "matchCriteriaId": "1A4B1323-9AF3-424F-925A-A62F35E575E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:sp2:*:*:*:*:*:*", "matchCriteriaId": "E454C72B-7804-402B-9C6A-687BF2C45D39", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9FE44373-06BD-4AA0-8778-06F2A150510C", "versionEndIncluding": "v11", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*", "matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:v11:sp1:*:*:*:*:*:*", "matchCriteriaId": "F53FDA20-FE97-4BA3-9165-F0BD7A25FA5F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*", "matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*", "matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*", "matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*", "matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*", "matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4510." }, { "lang": "es", "value": "Existe una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en el servidor web HMI en Siemens WinCC flexible v2004, v2005, v2007 y v2008 antes de SP3, WinCC V11 (tambi\u00e9n conocido como TIA Portal) antes de SP2 Update 1, el TP, OP, MP, Comfort Panels, y los paneles de Mobile Panels SIMATIC HMI, WinCC V11 Runtime Advanced, y WinCC flexible Runtime. Esta vulnerabilidad permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente a CVE-2011-4510." } ], "id": "CVE-2011-4511", "lastModified": "2024-11-21T01:32:27.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-02-03T20:55:01.407", "references": [ { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-03 20:55
Modified
2024-11-21 01:33
Severity ?
Summary
Directory traversal vulnerability in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute, read, create, modify, or delete arbitrary files via a .. (dot dot) in a string.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | wincc_flexible | 2004 | |
siemens | wincc_flexible | 2005 | |
siemens | wincc_flexible | 2007 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc | v11 | |
siemens | simatic_hmi_panels | comfort_panels | |
siemens | simatic_hmi_panels | mobile_panels | |
siemens | simatic_hmi_panels | mp | |
siemens | simatic_hmi_panels | op | |
siemens | simatic_hmi_panels | tp | |
siemens | wincc_runtime_advanced | v11 | |
siemens | wincc_flexible_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*", "matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*", "matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*", "matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*", "matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*", "matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*", "matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*", "matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*", "matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute, read, create, modify, or delete arbitrary files via a .. (dot dot) in a string." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en HmiLoad del cargador de tiempo de ejecuci\u00f3n (\"runtime loader\") de Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; y WinCC flexible Runtime, si el modo de transferencia (\"Transfer Mode\") est\u00e1 habilitado, permite a atacantes remotos ejecutar, leer, crear, modificar o borrar archivos arbitrarios a trav\u00e9s de los caracteres .. (punto punto) en una cadena." } ], "id": "CVE-2011-4876", "lastModified": "2024-11-21T01:33:10.577", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-03T20:55:01.937", "references": [ { "source": "cret@cert.org", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "source": "cret@cert.org", "url": "http://secunia.com/advisories/46997" }, { "source": "cret@cert.org", "url": "http://www.exploit-db.com/exploits/18166" }, { "source": "cret@cert.org", "url": "http://www.osvdb.org/77381" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "cret@cert.org", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "source": "cret@cert.org", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "cret@cert.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/46997" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/18166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/77381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71450" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-03 20:55
Modified
2024-11-21 01:32
Severity ?
Summary
The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime has an improperly selected default password for the administrator account, which makes it easier for remote attackers to obtain access via a brute-force approach involving many HTTP requests.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | wincc_flexible | 2004 | |
siemens | wincc_flexible | 2005 | |
siemens | wincc_flexible | 2007 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc | v11 | |
siemens | simatic_hmi_panels | comfort_panels | |
siemens | simatic_hmi_panels | mobile_panels | |
siemens | simatic_hmi_panels | mp | |
siemens | simatic_hmi_panels | op | |
siemens | simatic_hmi_panels | tp | |
siemens | wincc_runtime_advanced | v11 | |
siemens | wincc_flexible_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*", "matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*", "matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*", "matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*", "matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*", "matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*", "matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*", "matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*", "matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime has an improperly selected default password for the administrator account, which makes it easier for remote attackers to obtain access via a brute-force approach involving many HTTP requests." }, { "lang": "es", "value": "El servidor web HMI en Siemens WinCC flexible v2004, v2005, v2007 y v2008; WinCC V11 (tambi\u00e9n conocido como TIA Portal), el TP, OP, MP, Comfort Panels, y los paneles de Mobile Panels SIMATIC HMI, WinCC V11 Runtime Advanced, y WinCC Runtime, tiene una contrase\u00f1a por defecto mal seleccionado para la cuenta de administrador, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes remotos obtener acceso usando fuerza bruta mediante el uso de gran cantidad de peticiones HTTP." } ], "id": "CVE-2011-4509", "lastModified": "2024-11-21T01:32:26.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-03T20:55:01.297", "references": [ { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-03 20:55
Modified
2024-11-21 01:32
Severity ?
Summary
Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allow user-assisted remote attackers to execute arbitrary code via a crafted project file, related to the HMI web server and runtime loader.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | wincc_flexible | 2004 | |
siemens | wincc_flexible | 2005 | |
siemens | wincc_flexible | 2007 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc | v11 | |
siemens | simatic_hmi_panels | comfort_panels | |
siemens | simatic_hmi_panels | mobile_panels | |
siemens | simatic_hmi_panels | mp | |
siemens | simatic_hmi_panels | op | |
siemens | simatic_hmi_panels | tp | |
siemens | wincc_runtime_advanced | v11 | |
siemens | wincc_flexible_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*", "matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*", "matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*", "matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*", "matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*", "matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*", "matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*", "matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*", "matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allow user-assisted remote attackers to execute arbitrary code via a crafted project file, related to the HMI web server and runtime loader." }, { "lang": "es", "value": "Siemens WinCC flexible 2004, 2005, 2007 y 2008; WinCC V11 (TIA portal); TP, OP, MP, Comfort Panels y Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced y WinCC flexible Runtime permiten a atacantes remotos asistidos por el usuario ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo de proyecto, relacionado con un servidor web y el cargador de tiempo de ejecuci\u00f3n (\"runtime loader\")." } ], "id": "CVE-2011-4513", "lastModified": "2024-11-21T01:32:27.357", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-03T20:55:01.513", "references": [ { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-03 20:55
Modified
2024-11-21 01:33
Severity ?
Summary
Directory traversal vulnerability in miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to read arbitrary files via a ..%5c (dot dot backslash) in a URI.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | wincc_flexible | 2004 | |
siemens | wincc_flexible | 2005 | |
siemens | wincc_flexible | 2007 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc_flexible | 2008 | |
siemens | wincc | * | |
siemens | wincc | v11 | |
siemens | wincc | v11 | |
siemens | simatic_hmi_panels | comfort_panels | |
siemens | simatic_hmi_panels | mobile_panels | |
siemens | simatic_hmi_panels | mp | |
siemens | simatic_hmi_panels | op | |
siemens | simatic_hmi_panels | tp | |
siemens | wincc_runtime_advanced | v11 | |
siemens | wincc_flexible_runtime | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7D596C29-36F8-44F2-897D-FD107769E5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*", "matchCriteriaId": "2D84E29A-4BC2-4229-83C3-D9F7A641D19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9B3ADDE1-1F91-43E7-A3C3-3069916F4B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*", "matchCriteriaId": "1432EC7A-47B2-41D1-B90B-72DBB79AC266", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:sp1:*:*:*:*:*:*", "matchCriteriaId": "1A4B1323-9AF3-424F-925A-A62F35E575E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc_flexible:2008:sp2:*:*:*:*:*:*", "matchCriteriaId": "E454C72B-7804-402B-9C6A-687BF2C45D39", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "9FE44373-06BD-4AA0-8778-06F2A150510C", "versionEndIncluding": "v11", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*", "matchCriteriaId": "18A9883B-80E1-4B2E-88DA-D2326AE3DC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:wincc:v11:sp1:*:*:*:*:*:*", "matchCriteriaId": "F53FDA20-FE97-4BA3-9165-F0BD7A25FA5F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*", "matchCriteriaId": "DC593746-B329-43EA-8CA1-AA56AC5A3B10", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*", "matchCriteriaId": "1DF877E8-A0D1-4444-99F2-8A3E8ED4D31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*", "matchCriteriaId": "442AC914-BDD5-4D0C-9E04-88F60EE2B730", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*", "matchCriteriaId": "D9749966-1666-4F7D-90D0-17AFBB88AE83", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*", "matchCriteriaId": "9471D239-08B1-4076-82F7-2B73F4E343CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3AE80-C7A2-4581-993A-536936F6D315", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F785262-BBFB-4A0C-A7DC-97F5D6B94BB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to read arbitrary files via a ..%5c (dot dot backslash) in a URI." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en miniweb.exe de servidor web HMI de Siemens WinCC flexible 2004, 2005, 2007, y 2008 anteriores a SP3; WinCC V11 (TIA portal) anteriores a SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime permite a atacantes remotos leer archivos arbitrarios a trav\u00e9s de los caracteres ..%5c (punto punto barra invertida) en una URI." } ], "id": "CVE-2011-4878", "lastModified": "2024-11-21T01:33:11.850", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-03T20:55:02.030", "references": [ { "source": "cret@cert.org", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "source": "cret@cert.org", "url": "http://www.exploit-db.com/exploits/18166" }, { "source": "cret@cert.org", "url": "http://www.osvdb.org/77383" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "cret@cert.org", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "source": "cret@cert.org", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "cret@cert.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71452" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/18166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/77383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71452" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2011-4875
Vulnerability from cvelistv5
Published
2012-02-03 20:00
Modified
2024-08-07 00:16
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute arbitrary code via vectors related to Unicode strings.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf | x_refsource_MISC | |
http://www.osvdb.org/77380 | vdb-entry, x_refsource_OSVDB | |
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf | x_refsource_MISC | |
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | x_refsource_CONFIRM | |
http://www.exploit-db.com/exploits/18166 | exploit, x_refsource_EXPLOIT-DB | |
http://aluigi.org/adv/winccflex_1-adv.txt | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/71449 | vdb-entry, x_refsource_XF | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.128Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "name": "77380", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/77380" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/18166" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "simatic-hmiload-bo(71449)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71449" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute arbitrary code via vectors related to Unicode strings." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "name": "77380", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/77380" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/18166" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "simatic-hmiload-bo(71449)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71449" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4875", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute arbitrary code via vectors related to Unicode strings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "name": "77380", "refsource": "OSVDB", "url": "http://www.osvdb.org/77380" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/18166" }, { "name": "http://aluigi.org/adv/winccflex_1-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "simatic-hmiload-bo(71449)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71449" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4875", "datePublished": "2012-02-03T20:00:00", "dateReserved": "2011-12-21T00:00:00", "dateUpdated": "2024-08-07T00:16:35.128Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4511
Vulnerability from cvelistv5
Published
2012-02-03 20:00
Modified
2024-09-16 20:07
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4510.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:18.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4510." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-03T20:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4511", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4510." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4511", "datePublished": "2012-02-03T20:00:00Z", "dateReserved": "2011-11-22T00:00:00Z", "dateUpdated": "2024-09-16T20:07:51.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4876
Vulnerability from cvelistv5
Published
2012-02-03 20:00
Modified
2024-08-07 00:16
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute, read, create, modify, or delete arbitrary files via a .. (dot dot) in a string.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/46997 | third-party-advisory, x_refsource_SECUNIA | |
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf | x_refsource_MISC | |
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf | x_refsource_MISC | |
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | x_refsource_CONFIRM | |
http://www.exploit-db.com/exploits/18166 | exploit, x_refsource_EXPLOIT-DB | |
http://aluigi.org/adv/winccflex_1-adv.txt | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/71450 | vdb-entry, x_refsource_XF | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | x_refsource_MISC | |
http://www.osvdb.org/77381 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.056Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46997", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46997" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/18166" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "simatic-hmiload-dir-traversal(71450)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71450" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "name": "77381", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/77381" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute, read, create, modify, or delete arbitrary files via a .. (dot dot) in a string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "46997", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46997" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/18166" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "simatic-hmiload-dir-traversal(71450)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71450" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "name": "77381", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/77381" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4876", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute, read, create, modify, or delete arbitrary files via a .. (dot dot) in a string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46997", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46997" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/18166" }, { "name": "http://aluigi.org/adv/winccflex_1-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "simatic-hmiload-dir-traversal(71450)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71450" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" }, { "name": "77381", "refsource": "OSVDB", "url": "http://www.osvdb.org/77381" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4876", "datePublished": "2012-02-03T20:00:00", "dateReserved": "2011-12-21T00:00:00", "dateUpdated": "2024-08-07T00:16:35.056Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4513
Vulnerability from cvelistv5
Published
2012-02-03 20:00
Modified
2024-09-16 22:31
Severity ?
EPSS score ?
Summary
Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allow user-assisted remote attackers to execute arbitrary code via a crafted project file, related to the HMI web server and runtime loader.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:18.521Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allow user-assisted remote attackers to execute arbitrary code via a crafted project file, related to the HMI web server and runtime loader." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-03T20:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4513", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allow user-assisted remote attackers to execute arbitrary code via a crafted project file, related to the HMI web server and runtime loader." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4513", "datePublished": "2012-02-03T20:00:00Z", "dateReserved": "2011-11-22T00:00:00Z", "dateUpdated": "2024-09-16T22:31:15.150Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4514
Vulnerability from cvelistv5
Published
2012-02-03 20:00
Modified
2024-09-17 03:27
Severity ?
EPSS score ?
Summary
The TELNET daemon in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not perform authentication, which makes it easier for remote attackers to obtain access via a TCP session.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:18.497Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The TELNET daemon in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not perform authentication, which makes it easier for remote attackers to obtain access via a TCP session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-03T20:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TELNET daemon in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not perform authentication, which makes it easier for remote attackers to obtain access via a TCP session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4514", "datePublished": "2012-02-03T20:00:00Z", "dateReserved": "2011-11-22T00:00:00Z", "dateUpdated": "2024-09-17T03:27:33.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4508
Vulnerability from cvelistv5
Published
2012-02-03 20:00
Modified
2024-09-16 20:47
Severity ?
EPSS score ?
Summary
The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime generates predictable authentication tokens for cookies, which makes it easier for remote attackers to bypass authentication via a crafted cookie.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:18.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime generates predictable authentication tokens for cookies, which makes it easier for remote attackers to bypass authentication via a crafted cookie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-03T20:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4508", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime generates predictable authentication tokens for cookies, which makes it easier for remote attackers to bypass authentication via a crafted cookie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4508", "datePublished": "2012-02-03T20:00:00Z", "dateReserved": "2011-11-22T00:00:00Z", "dateUpdated": "2024-09-16T20:47:55.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4879
Vulnerability from cvelistv5
Published
2012-02-03 20:00
Modified
2024-08-07 00:16
Severity ?
EPSS score ?
Summary
miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not properly handle URIs beginning with a 0xfa character, which allows remote attackers to read data from arbitrary memory locations or cause a denial of service (application crash) via a crafted POST request.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf | x_refsource_MISC | |
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf | x_refsource_MISC | |
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | x_refsource_CONFIRM | |
http://www.exploit-db.com/exploits/18166 | exploit, x_refsource_EXPLOIT-DB | |
http://aluigi.org/adv/winccflex_1-adv.txt | x_refsource_MISC | |
http://www.osvdb.org/77384 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/71453 | vdb-entry, x_refsource_XF | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/18166" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "77384", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/77384" }, { "name": "simatic-miniweb-dos(71453)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71453" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not properly handle URIs beginning with a 0xfa character, which allows remote attackers to read data from arbitrary memory locations or cause a denial of service (application crash) via a crafted POST request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/18166" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "77384", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/77384" }, { "name": "simatic-miniweb-dos(71453)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71453" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4879", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not properly handle URIs beginning with a 0xfa character, which allows remote attackers to read data from arbitrary memory locations or cause a denial of service (application crash) via a crafted POST request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/18166" }, { "name": "http://aluigi.org/adv/winccflex_1-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "77384", "refsource": "OSVDB", "url": "http://www.osvdb.org/77384" }, { "name": "simatic-miniweb-dos(71453)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71453" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4879", "datePublished": "2012-02-03T20:00:00", "dateReserved": "2011-12-21T00:00:00", "dateUpdated": "2024-08-07T00:16:35.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4512
Vulnerability from cvelistv5
Published
2012-02-03 20:00
Modified
2024-09-16 18:09
Severity ?
EPSS score ?
Summary
CRLF injection vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:18.437Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "CRLF injection vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-03T20:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4512", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CRLF injection vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4512", "datePublished": "2012-02-03T20:00:00Z", "dateReserved": "2011-11-22T00:00:00Z", "dateUpdated": "2024-09-16T18:09:01.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4509
Vulnerability from cvelistv5
Published
2012-02-03 20:00
Modified
2024-09-17 01:26
Severity ?
EPSS score ?
Summary
The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime has an improperly selected default password for the administrator account, which makes it easier for remote attackers to obtain access via a brute-force approach involving many HTTP requests.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:18.472Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime has an improperly selected default password for the administrator account, which makes it easier for remote attackers to obtain access via a brute-force approach involving many HTTP requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-03T20:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4509", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime has an improperly selected default password for the administrator account, which makes it easier for remote attackers to obtain access via a brute-force approach involving many HTTP requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4509", "datePublished": "2012-02-03T20:00:00Z", "dateReserved": "2011-11-22T00:00:00Z", "dateUpdated": "2024-09-17T01:26:11.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4878
Vulnerability from cvelistv5
Published
2012-02-03 20:00
Modified
2024-08-07 00:16
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to read arbitrary files via a ..%5c (dot dot backslash) in a URI.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf | x_refsource_MISC | |
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf | x_refsource_MISC | |
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | x_refsource_CONFIRM | |
http://www.exploit-db.com/exploits/18166 | exploit, x_refsource_EXPLOIT-DB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/71452 | vdb-entry, x_refsource_XF | |
http://aluigi.org/adv/winccflex_1-adv.txt | x_refsource_MISC | |
http://www.osvdb.org/77383 | vdb-entry, x_refsource_OSVDB | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.129Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/18166" }, { "name": "simatic-miniweb-directory-traversal(71452)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71452" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "77383", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/77383" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to read arbitrary files via a ..%5c (dot dot backslash) in a URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/18166" }, { "name": "simatic-miniweb-directory-traversal(71452)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71452" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "77383", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/77383" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4878", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to read arbitrary files via a ..%5c (dot dot backslash) in a URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/18166" }, { "name": "simatic-miniweb-directory-traversal(71452)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71452" }, { "name": "http://aluigi.org/adv/winccflex_1-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "77383", "refsource": "OSVDB", "url": "http://www.osvdb.org/77383" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4878", "datePublished": "2012-02-03T20:00:00", "dateReserved": "2011-12-21T00:00:00", "dateUpdated": "2024-08-07T00:16:35.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4510
Vulnerability from cvelistv5
Published
2012-02-03 20:00
Modified
2024-09-16 18:28
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4511.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | x_refsource_CONFIRM | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:18.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4511." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-03T20:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4510", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4511." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4510", "datePublished": "2012-02-03T20:00:00Z", "dateReserved": "2011-11-22T00:00:00Z", "dateUpdated": "2024-09-16T18:28:15.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4877
Vulnerability from cvelistv5
Published
2012-02-03 20:00
Modified
2024-08-07 00:16
Severity ?
EPSS score ?
Summary
HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to cause a denial of service (application crash) by sending crafted data over TCP.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf | x_refsource_MISC | |
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf | x_refsource_MISC | |
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | x_refsource_CONFIRM | |
http://www.exploit-db.com/exploits/18166 | exploit, x_refsource_EXPLOIT-DB | |
http://aluigi.org/adv/winccflex_1-adv.txt | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/71451 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/77382 | vdb-entry, x_refsource_OSVDB | |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/18166" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "simatic-hmiload-dos(71451)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71451" }, { "name": "77382", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/77382" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to cause a denial of service (application crash) by sending crafted data over TCP." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/18166" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "simatic-hmiload-dos(71451)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71451" }, { "name": "77382", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/77382" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4877", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to cause a denial of service (application crash) by sending crafted data over TCP." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf" }, { "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf" }, { "name": "18166", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/18166" }, { "name": "http://aluigi.org/adv/winccflex_1-adv.txt", "refsource": "MISC", "url": "http://aluigi.org/adv/winccflex_1-adv.txt" }, { "name": "simatic-hmiload-dos(71451)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71451" }, { "name": "77382", "refsource": "OSVDB", "url": "http://www.osvdb.org/77382" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4877", "datePublished": "2012-02-03T20:00:00", "dateReserved": "2011-12-21T00:00:00", "dateUpdated": "2024-08-07T00:16:35.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }