Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0136 Vulnerabilities in SIMATIC WinCC, PCS 7 and WinCC in TIA Portal 25 November 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Siemens SIMATIC WinCC Siemens SIMATIC PCS 7 Siemens TIA Portal Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-8552 CVE-2014-8551 Member content until: Thursday, December 25 2014 OVERVIEW Siemens has identified two vulnerabilities which affect the following Siemens products: 1. Siemens SIMATIC WinCC all versions of 7.0 SP2 and earlier and 7.0 SP3, V7.2 prior to Update 9 and V7.3 prior to Update2. 2. Siemens SIMATIC PCS 7 versions V7.1 SP4 and earlier, V8.0 and V8.1. 3. Siemens TIA Portal (with WinCC Professional Runtime) V13 prior to Update 6. [1] IMPACT The vendor has provided the following details regarding the vulnerabilities: CVE-2014-8551: "A component within WinCC could allow remote code execution for unauthenticated users if specially crafted packets are sent to the WinCC server. CVE-2014-8552: "A component within WinCC could allow unauthenticated users to extract arbitrary files from the WinCC server if specially crafted packets are sent to the server".[1] MITIGATION The vendor strongly recommends users upgrade to the new versions as soon as possible. [1] REFERENCES [1] SSA-134508: Vulnerabilities in SIMATIC WinCC, PCS 7 and WinCC in TIA Portal https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVHQlcxLndAQH1ShLAQJREg//T+EWyDgowyJK9zO4MUoPyhhgIXCZ6q52 Cc2xQmzuM4MS5pLsE+DopHHo6I/l5XZxctJb0iykBRNc6cppDHWMkciWJFwMu4Tx DqsM/54IJNnD70uuibH6zHkOs4CfAxfsDhV97FWU+j3lKoUyCgCXkhsGVS+Jp3nK RCQuKXd7WCU+bjzVFarq/6s4YO60cp0IMUWQPEwQ2+/47PHH9wZ48rytqwAeQ9hN +Lw9zze6e1gX3sPxlLatR/+6j1md5X8uzpuqr6476xZgSj+XOn2o3VqyvdFNbDIQ 0SKMy97sVsso+Ls0etQ9fir4uYfoe7xR8i7FYJCjLEQI79N71zlqAJnsJ30UecRt +l/45K6Gdv5mWN5pkLljHwLq9PzJNQjiphq1h658ppd9o2ltrc14viNFKRigR0Qw fLcQTb3oXo+I478OFBf3nXCryixzr3dWNWUiCW5CdF8UsAZcfSaSrmEtWXkwmSjc 9wQCe6A1SNN48AhP+5Fevh+V7Ha8aG2H94IczEYMiv3uWGLmNYVQ+t2UQC8ruLNL s3j4GtcZ24bAE+KcXXsYIFHesEerYXCQo+pEmUGq0gUXp/2Qb6eOSkXtzx//01lV poFhute6tYXFS1iKGlDnxlJ8GAhW7hf7KCmf0ad8kWmhWAtyJRD4UTXEzgDKZNA0 /mVMSSTQsV4= =6Z+x -----END PGP SIGNATURE-----