First published: Wed Nov 26 2014(Updated: )
The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to execute arbitrary code via crafted packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic PCS 7 Telecontrol Firmware | =7.1-sp1 | |
Siemens SIMATIC PCS 7 | =7.1-sp3 | |
Siemens SIMATIC PCS 7 | =7.1-sp4 | |
Siemens SIMATIC PCS 7 | =8.0-sp1 | |
Siemens SIMATIC PCS 7 | =8.0-sp2 | |
Siemens SIMATIC PCS 7 | =8.1 | |
Siemens TIA Portal | =13.0 | |
Siemens TIA Portal | =13.0-3 | |
Siemens TIA Portal | =13.0-5 | |
Siemens WinCC | =7.0 | |
Siemens WinCC | =7.0-sp1 | |
Siemens WinCC | =7.0-sp2 | |
Siemens WinCC | =7.0-sp3 | |
Siemens WinCC | =7.2-1 | |
Siemens WinCC | =7.2-2 | |
Siemens WinCC | =7.2-3 | |
Siemens WinCC | =7.2-4 | |
Siemens WinCC | =7.2-5 | |
Siemens WinCC | =7.2-6 | |
Siemens WinCC | =7.2-7 | |
Siemens WinCC | =7.2-8 | |
Siemens WinCC | =7.3-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8551 has been assigned a high severity rating due to the potential for remote code execution.
To fix CVE-2014-8551, it's recommended to apply the latest updates provided by Siemens for affected software versions.
Vulnerable versions include Siemens SIMATIC WinCC 7.0 to SP3, 7.2 before Update 9, 7.3 before Update 2, and SIMATIC PCS 7 versions up to 8.1.
CVE-2014-8551 allows remote attackers to execute arbitrary code through crafted network packets.
A definitive workaround is not listed, but minimizing the exposure of vulnerable systems to untrusted networks can reduce risk until updates are applied.