-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2014.0136
      Vulnerabilities in SIMATIC WinCC, PCS 7 and WinCC in TIA Portal
                             25 November 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Siemens SIMATIC WinCC
                      Siemens SIMATIC PCS 7
                      Siemens TIA Portal
Operating System:     Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                      Access Confidential Data        -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2014-8552 CVE-2014-8551 
Member content until: Thursday, December 25 2014

OVERVIEW

        Siemens has identified two vulnerabilities which affect the 
        following Siemens products:
        
        1. Siemens SIMATIC WinCC all versions of 7.0 SP2 and earlier and 7.0 
           SP3, V7.2 prior to Update 9 and V7.3 prior to Update2.
        
        2. Siemens SIMATIC PCS 7 versions V7.1 SP4 and earlier, V8.0 and V8.1.
        
        3. Siemens TIA Portal (with WinCC Professional Runtime) V13 prior to 
           Update 6. [1]


IMPACT

        The vendor has provided the following details regarding the 
        vulnerabilities:
        
        CVE-2014-8551: "A component within WinCC could allow remote code 
        execution for unauthenticated users if specially crafted packets are
        sent to the WinCC server.
        
        CVE-2014-8552: "A component within WinCC could allow unauthenticated
        users to extract arbitrary files from the WinCC server if specially
        crafted packets are sent to the server".[1]


MITIGATION

        The vendor strongly recommends users upgrade to the new versions as
        soon as possible. [1]


REFERENCES

        [1] SSA-134508: Vulnerabilities in SIMATIC WinCC, PCS 7 and WinCC in
            TIA Portal
            https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=6Z+x
-----END PGP SIGNATURE-----