First published: Thu May 11 2017(Updated: )
A vulnerability was discovered in Siemens SIMATIC WinCC (V7.3 before Upd 11 and V7.4 before SP1), SIMATIC WinCC Runtime Professional (V13 before SP2 and V14 before SP1), SIMATIC WinCC (TIA Portal) Professional (V13 before SP2 and V14 before SP1) that could allow an authenticated, remote attacker who is member of the "administrators" group to crash services by sending specially crafted messages to the DCOM interface.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic WinCC | =7.3 | |
Siemens Simatic WinCC | =7.4 | |
Siemens SIMATIC WinCC (TIA Portal) | =13-sp1 | |
Siemens SIMATIC WinCC (TIA Portal) | =14 | |
siemens SIMATIC WinCC Runtime | =13-sp1 | |
siemens SIMATIC WinCC Runtime | =14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6867 is classified as a high severity vulnerability.
CVE-2017-6867 affects Siemens SIMATIC WinCC versions 7.3 and 7.4, as well as WinCC Runtime Professional versions 13 and 14.
To fix CVE-2017-6867, users should update their Siemens SIMATIC WinCC and WinCC Runtime Professional software to the latest versions.
Yes, CVE-2017-6867 can be exploited by an authenticated remote attacker.
CVE-2017-6867 could allow an attacker to perform unauthorized actions within the affected applications.