01 August 2013
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2013.0090 SSA-064884: Vulnerabilities in WinCC (TIA Portal) 1 August 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Siemens WinCC (TIA Portal) Operating System: Windows Server 2003 Windows Server 2008 Windows Server 2008 R2 Windows 7 Windows XP Impact/Access: Cross-site Request Forgery -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2013-4912 CVE-2013-4911 Member content until: Saturday, August 31 2013 OVERVIEW Multiple vulnerabilities have been identified in Siemens SIMATIC WinCC (TIA Portal) v11 and v12.  IMPACT The vendor has provided the following description regarding these vulnerabilities: "Vulnerability 1 (CVE-2013-4911) The web server of the affected HMI panels may allow CSRF (Cross-site request forgery) attacks, compromising integrity and availability of the system. CVSS Base Score 5.8 CVSS Temporal Score 4.5 CVSS Overall Score 4.5 (AV:N/AC:M/Au:N/C:N/I:P/A:P/E:POC/RL:OF/RC:C) Vulnerability 2 (CVE-2013-4912) The web server of the affected HMI panels may allow URL redirection to untrusted websites. CVSS Base Score 4.3 CVSS Temporal Score 3.4 CVSS Overall Score 3.4 (AV:N/AC:M/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C)"  MITIGATION The vendor has given the following solution: "Siemens provides software update WinCC (TIA Portal) V12 SP1 which fixes both vulnerabilities. WinCC (TIA Portal) V11 users should also upgrade to this software version. After installing the software update, upgrade the device firmware by using the function 'Change Device/Version' in the user interface."  REFERENCES  SSA-064884: Vulnerabilities in WinCC (TIA Portal) http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-064884.pdf AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: email@example.com Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUfnwFxLndAQH1ShLAQIiZQ/9Gi+gocYEKY2oLQG+LekUTpIrk6hkT8kN urTOC14z2vHasTpsZs3h5bjKErtkNXUs85IW91SPjutcrs2h/34GBvkh5DQT82ho xe50UQgAa/axQEriOwFja6l7KPtbi/oB5Oo+haQpqpjqsEM9OkBqlb/pwjFCAKBq xc8c+Y4OMIoqDpUjqgXr2kIzgMIeE7UuGj77v4MBsPFN0dZxolaWkh4Qqdn5mbt+ b5KKSfmzuKTWE7jgfLskypFINhgMy7rAjhTzx2l85XcmlJp7m2GqRQjMQJWiY3CO oLRHQpY9bNJ4ugsWzP3+HYm3lQZosYAluxuGYd3EUroUwp5jdPPWAP+0pVGXNao8 hk0pd/Q67d9+3rIr2HstE+hvMMWkFqnS7V1ya3w/HUEw9cemcr6YB3Y4RHP4HnNa 0kBQvK3d1sflofYkMUOwknwefSjm78Qttg2J2pEhqhXA4pmg06eqjz6S38T//ZQ0 wqHsvlSgTleE8VjCriAjO5WW6s79uvgEr67XE6O1DEa74KiVeQoAa4r9UDvepkS9 GCn97jhjxiu1+eTChQjiD5rBQw8/LplGWzsK2HX3m+1z1JZWBmZ26oU2NQZxgY0K sO45rL3WG54/wnlyFM8vjwCI8oqK3gGK6LYTT73AwzhZpB2JmBunH3ybFcX2JtFF IwpHK2E6XBc= =Kz3i -----END PGP SIGNATURE-----