First published: Fri Feb 07 2014(Updated: )
Siemens SIMATIC WinCC OA before 3.12 P002 January uses a weak hash algorithm for passwords, which makes it easier for remote attackers to obtain access via a brute-force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC WinCC OA | <=3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-1696 is classified as a medium risk due to its potential for remote exploitation through weak password hashing.
To fix CVE-2014-1696, update to Siemens SIMATIC WinCC OA version 3.12 P002 or later, which addresses the weak hash algorithm issue.
CVE-2014-1696 affects users of Siemens SIMATIC WinCC OA versions prior to 3.12 P002, which utilize a weak hash algorithm for passwords.
CVE-2014-1696 enables remote attackers to perform brute-force attacks to gain unauthorized access to systems.
Siemens SIMATIC WinCC OA is an open architecture software application used for visualization and control in automation systems.