First published: Thu Dec 13 2018(Updated: )
A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All Versions < V15.1). Password hashes with insufficient computational effort could allow an attacker to access to a project file and reconstruct passwords. The vulnerability could be exploited by an attacker with local access to the project file. No user interaction is required to exploit the vulnerability. The vulnerability could allow the attacker to obtain certain passwords from the project. At the time of advisory publication no public exploitation of this vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC STEP 7 (TIA Portal) | <15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-13811 is high due to its potential to allow unauthorized access to sensitive project files.
To fix CVE-2018-13811, upgrade to SIMATIC STEP 7 (TIA Portal) version 15.1 or later.
CVE-2018-13811 affects all versions of SIMATIC STEP 7 (TIA Portal) prior to version 15.1.
CVE-2018-13811 cannot be exploited remotely as it requires local access to the affected system.
Exploiting CVE-2018-13811 allows an attacker to reconstruct passwords and gain unauthorized access to project files.