First published: Mon Apr 06 2015(Updated: )
Siemens SIMATIC STEP 7 (TIA Portal) 12 and 13 before 13 SP1 Upd1 improperly stores password data within project files, which makes it easier for local users to determine cleartext (1) protection-level passwords or (2) web-server passwords by leveraging the ability to read these files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SIMATIC STEP 7 | <=13.0 | |
SIMATIC STEP 7 | =12.0 | |
SIMATIC STEP 7 | =13.0 |
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-315836.pdf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1602 has been rated as a medium-severity vulnerability due to improper password data storage.
To mitigate CVE-2015-1602, users should upgrade to Siemens SIMATIC STEP 7 version 13 SP1 Upd1 or later.
The potential impacts of CVE-2015-1602 include unauthorized access to cleartext passwords, which may lead to further exploitation.
CVE-2015-1602 affects Siemens SIMATIC STEP 7 versions 12.0 and 13.0 before service pack 1 update 1.
Yes, local users can exploit CVE-2015-1602 by accessing project files that improperly store sensitive password data.