First published: Fri Jul 22 2016(Updated: )
Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic WinCC | =7.0 | |
Siemens Simatic WinCC | =7.0-sp1 | |
Siemens Simatic WinCC | =7.0-sp2 | |
Siemens Simatic WinCC | =7.0-sp3 | |
Siemens Simatic WinCC | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5744 is rated as high severity due to its potential to allow remote attackers to access sensitive files.
To fix CVE-2016-5744, it is recommended to update to a newer version of Siemens SIMATIC WinCC beyond 7.2.
The affected versions of Siemens SIMATIC WinCC are 7.0 through SP3 and 7.2.
Yes, CVE-2016-5744 can be exploited remotely by attackers sending crafted packets.
CVE-2016-5744 puts arbitrary WinCC station files at risk of being read by remote attackers.