First published: Thu Jul 24 2014(Updated: )
The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, has a hardcoded encryption key, which allows remote attackers to obtain sensitive information by extracting this key from another product installation and then employing this key during the sniffing of network traffic on TCP port 1030.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic PCS 7 | <=8.0 | |
Siemens Simatic PCS 7 | =7.1-sp3 | |
Siemens Simatic PCS 7 | =8.0 | |
Siemens WinCC | <=7.2 | |
Siemens WinCC | =5.0 | |
Siemens WinCC | =5.0-sp1 | |
Siemens WinCC | =6.0 | |
Siemens WinCC | =6.0-sp2 | |
Siemens WinCC | =6.0-sp3 | |
Siemens WinCC | =6.0-sp4 | |
Siemens WinCC | =7.0 | |
Siemens WinCC | =7.0-sp1 | |
Siemens WinCC | =7.0-sp2 | |
Siemens WinCC | =7.0-sp3 | |
Siemens WinCC | =7.1 | |
Siemens WinCC | =7.1-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4686 has been classified as a medium severity vulnerability.
To fix CVE-2014-4686, update to Siemens SIMATIC WinCC version 7.3 or later.
CVE-2014-4686 allows remote attackers to access sensitive information due to a hardcoded encryption key.
CVE-2014-4686 affects various versions of Siemens SIMATIC WinCC and PCS7 products, specifically prior to version 7.3.
Yes, checking for the presence of the hardcoded encryption key in affected Siemens software installations can help identify the vulnerability.