First published: Fri Feb 03 2012(Updated: )
miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not properly handle URIs beginning with a 0xfa character, which allows remote attackers to read data from arbitrary memory locations or cause a denial of service (application crash) via a crafted POST request.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens WinCC flexible | =2004 | |
Siemens WinCC flexible | =2008 | |
Siemens WinCC flexible | =2008-sp1 | |
Siemens WinCC flexible | =2008-sp2 | |
Siemens WinCC flexible | =2007 | |
Siemens WinCC flexible | =2005 | |
Siemens WinCC | =v11 | |
Siemens WinCC | =v11-sp1 | |
Siemens WinCC | <=v11 | |
Siemens Simatic Hmi Panels | =tp | |
Siemens Simatic Hmi Panels | =op | |
Siemens Simatic Hmi Panels | =mobile_panels | |
Siemens Simatic Hmi Panels | =comfort_panels | |
Siemens Simatic Hmi Panels | =mp | |
Siemens Wincc Runtime Advanced | =v11 | |
Siemens Wincc Flexible Runtime |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.