First published: Thu Jul 24 2014(Updated: )
The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote attackers to obtain sensitive information via an HTTP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic PCS 7 | <=8.0 | |
Siemens Simatic PCS 7 | =7.1-sp3 | |
Siemens Simatic PCS 7 | =8.0 | |
Siemens WinCC | <=7.2 | |
Siemens WinCC | =5.0 | |
Siemens WinCC | =5.0-sp1 | |
Siemens WinCC | =6.0 | |
Siemens WinCC | =6.0-sp2 | |
Siemens WinCC | =6.0-sp3 | |
Siemens WinCC | =6.0-sp4 | |
Siemens WinCC | =7.0 | |
Siemens WinCC | =7.0-sp1 | |
Siemens WinCC | =7.0-sp2 | |
Siemens WinCC | =7.0-sp3 | |
Siemens WinCC | =7.1 | |
Siemens WinCC | =7.1-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4682 is rated as a medium severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2014-4682, update your Siemens SIMATIC WinCC or PCS7 software to the latest version that addresses this vulnerability.
CVE-2014-4682 allows remote attackers to obtain sensitive information via crafted HTTP requests.
CVE-2014-4682 affects Siemens SIMATIC WinCC versions up to 7.2 and various versions of Siemens SIMATIC PCS7, specifically versions prior to 7.3.
Yes, Siemens has released patches for the affected versions to mitigate the vulnerabilities listed under CVE-2014-4682.