First published: Fri Feb 03 2012(Updated: )
Stack-based buffer overflow in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute arbitrary code via vectors related to Unicode strings.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC WinCC flexible 2008 | =2004 | |
Siemens SIMATIC WinCC flexible 2008 | =2005 | |
Siemens SIMATIC WinCC flexible 2008 | =2007 | |
Siemens SIMATIC WinCC flexible 2008 | =2008 | |
Siemens WinCC | =v11 | |
Siemens SIMATIC HMI Panels | =comfort_panels | |
Siemens SIMATIC HMI Panels | =mobile_panels | |
Siemens SIMATIC HMI Panels | =mp | |
Siemens SIMATIC HMI Panels | =op | |
Siemens SIMATIC HMI Panels | =tp | |
Siemens SIMATIC WinCC Runtime Advanced | =v11 | |
Siemens SIMATIC WinCC flexible Runtime |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4875 has been classified with a high severity level due to the potential for remote code execution through a stack-based buffer overflow.
To fix CVE-2011-4875, apply the latest security patches or updates provided by Siemens for the affected WinCC flexible and HMI Panel software.
CVE-2011-4875 affects Siemens WinCC flexible versions 2004, 2005, 2007, 2008, WinCC V11, and various SIMATIC HMI panels.
Yes, CVE-2011-4875 can be exploited remotely if the Transfer Mode is enabled, allowing attackers to execute arbitrary code.
Exploitation of CVE-2011-4875 could lead to unauthorized access and control over the affected systems, resulting in significant operational risks.