First published: Fri Jun 14 2013(Updated: )
The login implementation in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, has a hardcoded account, which makes it easier for remote attackers to obtain access via an unspecified request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC PCS 7 | <=8.0 | |
Siemens SIMATIC PCS 7 | =8.0 | |
Siemens WinCC | <=7.2 | |
Siemens WinCC | =7.0 | |
Siemens WinCC | =7.0-sp1 | |
Siemens WinCC | =7.0-sp2 | |
Siemens WinCC | =7.0-sp3 | |
Siemens WinCC | =7.1 | |
Siemens WinCC | =7.1-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3958 is considered a high severity vulnerability due to the presence of a hardcoded account that allows unauthorized access.
To mitigate CVE-2013-3958, update Siemens WinCC to version 7.2 Update 1 or later to remove the hardcoded account.
CVE-2013-3958 affects Siemens WinCC versions prior to 7.2 Update 1 and the SIMATIC PCS7 version 8.0 SP1 and earlier.
Yes, CVE-2013-3958 can be exploited remotely due to the hardcoded account vulnerability in the login implementation.
The impact of CVE-2013-3958 includes unauthorized access to systems, which can potentially lead to data breaches and manipulation.