First published: Tue Sep 11 2018(Updated: )
A vulnerability has been identified in SIMATIC WinCC OA V3.14 and prior (All versions < V3.14-P021). Improper access control to a data point of the affected product could allow an unauthenticated remote user to escalate its privileges in the context of SIMATIC WinCC OA V3.14. This vulnerability could be exploited by an attacker with network access to port 5678/TCP of the SIMATIC WinCC OA V3.14 server. Successful exploitation requires no user privileges and no user interaction. This vulnerability could allow an attacker to compromise integrity and availability of the SIMATIC WinCC OA system. At the time of advisory publication no public exploitation of this vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC WinCC OA (Open Architecture) | <=3.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13799 has been assigned a high severity rating due to the potential for privilege escalation by an unauthenticated remote user.
To mitigate CVE-2018-13799, upgrade SIMATIC WinCC OA to version 3.14-P021 or later, which addresses the improper access control issue.
CVE-2018-13799 affects all versions of SIMATIC WinCC OA prior to version 3.14-P021.
Yes, CVE-2018-13799 can be exploited remotely due to improper access control allowing escalation of privileges.
The vendor for CVE-2018-13799 is Siemens, specifically for their SIMATIC WinCC Open Architecture product.