-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2013.0090
             SSA-064884: Vulnerabilities in WinCC (TIA Portal)
                               1 August 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Siemens WinCC (TIA Portal)
Operating System:     Windows Server 2003
                      Windows Server 2008
                      Windows Server 2008 R2
                      Windows 7
                      Windows XP
Impact/Access:        Cross-site Request Forgery     -- Remote with User Interaction
                      Provide Misleading Information -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2013-4912 CVE-2013-4911 
Member content until: Saturday, August 31 2013

OVERVIEW

        Multiple vulnerabilities have been identified in Siemens SIMATIC WinCC
        (TIA Portal) v11 and v12. [1]


IMPACT

        The vendor has provided the following description regarding these 
        vulnerabilities:
        
        "Vulnerability 1 (CVE-2013-4911)
        The web server of the affected HMI panels may allow CSRF (Cross-site 
        request forgery) attacks, compromising integrity and availability of 
        the system.
        
        CVSS Base Score		5.8
        CVSS Temporal Score 	4.5
        CVSS Overall Score	4.5 
        (AV:N/AC:M/Au:N/C:N/I:P/A:P/E:POC/RL:OF/RC:C)
        
        Vulnerability 2 (CVE-2013-4912)
        The web server of the affected HMI panels may allow URL redirection to
        untrusted websites.
        CVSS Base Score		4.3
        CVSS Temporal Score 	3.4
        CVSS Overall Score	3.4 
        (AV:N/AC:M/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C)" [1]


MITIGATION

        The vendor has given the following solution:
        
        "Siemens provides software update WinCC (TIA Portal) V12 SP1 which 
        fixes both vulnerabilities. WinCC (TIA Portal) V11 users should also 
        upgrade to this software version.
        
        After installing the software update, upgrade the device firmware by 
        using the function 'Change Device/Version' in the user interface." [1]


REFERENCES

        [1] SSA-064884: Vulnerabilities in WinCC (TIA Portal)
            http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-064884.pdf

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Kz3i
-----END PGP SIGNATURE-----