First published: Thu Mar 21 2013(Updated: )
Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to execute arbitrary code via a long parameter.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC PCS 7 | <=8.0 | |
Siemens SIMATIC PCS 7 | =7.1-sp3 | |
Siemens WinCC | <=7.1 | |
Siemens WinCC | =5.0 | |
Siemens WinCC | =5.0-sp1 | |
Siemens WinCC | =6.0 | |
Siemens WinCC | =6.0-sp2 | |
Siemens WinCC | =6.0-sp3 | |
Siemens WinCC | =6.0-sp4 | |
Siemens WinCC | =7.0 | |
Siemens WinCC | =7.0-sp1 | |
Siemens WinCC | =7.0-sp2 | |
Siemens WinCC | =7.0-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0674 is classified as critical due to its potential for remote code execution.
To address CVE-2013-0674, it is recommended to update Siemens WinCC and SIMATIC PCS7 to versions 7.2 or later.
CVE-2013-0674 affects Siemens WinCC versions up to 7.1 and SIMATIC PCS7 versions up to 8.0.
Yes, CVE-2013-0674 can be exploited by attackers remotely via a specially crafted parameter.
Yes, Siemens has released patches with updates for affected products that address CVE-2013-0674.