First published: Thu Jul 22 2010(Updated: )
Siemens Simatic WinCC and PCS 7 SCADA system uses a hard-coded password, which allows local users to access a back-end database and gain privileges, as demonstrated in the wild in July 2010 by the Stuxnet worm, a different vulnerability than CVE-2010-2568.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens WinCC | =6.2 | |
Siemens WinCC | =7.0 | |
Siemens Simatic PCS 7 Telecontrol Firmware | =6.0 | |
Siemens Simatic PCS 7 Telecontrol Firmware | =6.1 | |
Siemens Simatic PCS 7 Telecontrol Firmware | =7.0 | |
Siemens Simatic PCS 7 Telecontrol Firmware | =7.0-sp1 | |
Siemens Simatic PCS 7 Telecontrol Firmware | =7.1 | |
Siemens Simatic PCS 7 Telecontrol Firmware | =7.1-sp1 | |
Siemens WinCC | ||
Siemens Simatic PCS 7 Telecontrol Firmware | ||
Siemens Simatic PCS 7 Telecontrol Firmware | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2772 is considered critical due to its exploitation by the Stuxnet worm, which gained unauthorized access to SCADA systems.
To remediate CVE-2010-2772, change the hard-coded password used by the affected Siemens software and ensure proper authentication measures are in place.
CVE-2010-2772 affects Siemens Simatic WinCC versions 6.2 and 7.0, as well as Siemens SIMATIC PCS 7 versions 6.0, 6.1, 7.0, and 7.1.
CVE-2010-2772 primarily requires local access to the affected systems for exploitation, making it less likely to pose a remote attack vector.
Organizations using the vulnerable Siemens SCADA systems risk unauthorized access and control over critical infrastructure, potentially leading to severe operational impacts.