Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-5744 (GCVE-0-2016-5744)
Vulnerability from cvelistv5
- n/a
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T01:07:59.970Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "92116",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/92116"
},
{
"name": "1036441",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1036441"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-07-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "92116",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/92116"
},
{
"name": "1036441",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1036441"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-5744",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "92116",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92116"
},
{
"name": "1036441",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036441"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
},
{
"name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-5744",
"datePublished": "2016-07-22T15:00:00",
"dateReserved": "2016-06-22T00:00:00",
"dateUpdated": "2024-08-06T01:07:59.970Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2016-5744\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-07-22T15:59:01.397\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets.\"},{\"lang\":\"es\",\"value\":\"Siemens SIMATIC WinCC 7.0 hasta la versi\u00f3n SP3 y 7.2 permite a atacantes remotos leer archivos de la estaci\u00f3n WinCC arbitrarios a trav\u00e9s de paquetes manipulados.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF84FC5-9450-47B7-A4F0-99361C528C00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc:7.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8274939-833E-40E1-8D2E-1B28CEA91036\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc:7.0:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"61F46206-F232-4F62-AF4F-E2DCF462AE60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc:7.0:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D0BB2E6-1444-499A-943E-8D19C402F1BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4BFBED-E818-453C-B787-22D67B4A5A29\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/92116\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036441\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/92116\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036441\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
fkie_cve-2016-5744
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.securityfocus.com/bid/92116 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securitytracker.com/id/1036441 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf | Mitigation, Vendor Advisory | |
| cve@mitre.org | https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92116 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036441 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01 |
| Vendor | Product | Version | |
|---|---|---|---|
| siemens | simatic_wincc | 7.0 | |
| siemens | simatic_wincc | 7.0 | |
| siemens | simatic_wincc | 7.0 | |
| siemens | simatic_wincc | 7.0 | |
| siemens | simatic_wincc | 7.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3CF84FC5-9450-47B7-A4F0-99361C528C00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "E8274939-833E-40E1-8D2E-1B28CEA91036",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp2:*:*:*:*:*:*",
"matchCriteriaId": "61F46206-F232-4F62-AF4F-E2DCF462AE60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp3:*:*:*:*:*:*",
"matchCriteriaId": "0D0BB2E6-1444-499A-943E-8D19C402F1BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:simatic_wincc:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4BFBED-E818-453C-B787-22D67B4A5A29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets."
},
{
"lang": "es",
"value": "Siemens SIMATIC WinCC 7.0 hasta la versi\u00f3n SP3 y 7.2 permite a atacantes remotos leer archivos de la estaci\u00f3n WinCC arbitrarios a trav\u00e9s de paquetes manipulados."
}
],
"id": "CVE-2016-5744",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-07-22T15:59:01.397",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/92116"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1036441"
},
{
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"source": "cve@mitre.org",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/92116"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1036441"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
icsa-16-208-01c
Vulnerability from csaf_cisa
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-16-208-01C JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2016/icsa-16-208-01c.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-16-208-01C - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-16-208-01c"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Siemens SIMATIC WinCC, PCS 7, and WinCC Runtime Professional Vulnerabilities (Update C)",
"tracking": {
"current_release_date": "2025-06-25T18:13:26.602224Z",
"generator": {
"date": "2025-06-25T18:13:26.602197Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-16-208-01C",
"initial_release_date": "2016-04-29T06:00:00.000000Z",
"revision_history": [
{
"date": "2016-04-29T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2025-06-25T18:13:26.602224Z",
"legacy_version": "CSAF Conversion",
"number": "2",
"summary": "Advisory converted into a CSAF"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cUpdate_12",
"product": {
"name": "Siemens SIMATIC WinCC 7.0 SP2: \u003cUpdate_12",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC 7.0 SP2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cUpdate_8",
"product": {
"name": "Siemens SIMATIC WinCC 7.0 SP3: \u003cUpdate_8",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC 7.0 SP3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cUpdate_13",
"product": {
"name": "Siemens SIMATIC WinCC 7.2: \u003cUpdate_13",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC 7.2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cUpdate_10",
"product": {
"name": "Siemens SIMATIC WinCC 7.3: \u003cUpdate_10",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC 7.3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cUpdate_1",
"product": {
"name": "Siemens SIMATIC WinCC 7.4: \u003cUpdate_1",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC 7.4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.1_SP4_with_WinCC_V7.0_SP2_Update_12",
"product": {
"name": "Siemens SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7): \u003cV7.1_SP4_with_WinCC_V7.0_SP2_Update_12",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.0_SP2_with_WinCC_V7.2_Update_13",
"product": {
"name": "Siemens SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7): \u003cV8.0_SP2_with_WinCC_V7.2_Update_13",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.1_SP1_with_WinCC_V7.3_Update_10",
"product": {
"name": "Siemens SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7): \u003c8.1_SP1_with_WinCC_V7.3_Update_10",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.2_with_WinCC_V7.4_Update_1",
"product": {
"name": "Siemens SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7): \u003c8.2_with_WinCC_V7.4_Update_1",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV13_SP_1_Update_9",
"product": {
"name": "Siemens SIMATIC WinCC Runtime Professional: \u003cV13_SP_1_Update_9",
"product_id": "CSAFPID-0010"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC Runtime Professional"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5743",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens has produced updates for the following products and strongly encourages users to upgrade to the new versions as soon as possible: SIMATIC WinCC V7.0 SP2: Update to V7.0 SP2 Update 12 (https://support.industry.siemens.com/cs/ww/en/view/109741519)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109741519"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.0 SP3:: Update to V7.0 SP3 Update 8 (https://support.industry.siemens.com/cs/ww/en/view/109741127)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109741127"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.2: Update to WinCC V7.2 Update 13 (https://support.industry.siemens.com/cs/ww/en/view/109739416)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109739416"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.3: Update to WinCC V7.3 Update 10 (https://support.industry.siemens.com/cs/ww/en/view/109738470)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738470"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.4: Update to WinCC V7.4 Update 1 (https://support.industry.siemens.com/cs/ww/de/view/109738653)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/de/view/109738653"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V7.1 SP4 and earlier versions: WinCC: Update to WinCC V7.0 SP2 Update 12 (https://support.industry.siemens.com/cs/ww/en/view/109741519)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109741519"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V7.1 SP1 Update 21 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V7.1 SP2 Update 11 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V7.1 SP2 Update 6 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS 7 V7.1 SP4 Update 2 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V8.0 SP2: WinCC: Update to WinCC V7.2 Update 13 (https://support.industry.siemens.com/cs/ww/en/view/109739416)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109739416"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V8.0 SP1 Update 17 (https://support.industry.siemens.com/cs/ww/en/view/109738680)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738680"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V8.0 SP1 Update 6 (https://support.industry.siemens.com/cs/ww/en/view/109738680)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738680"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS 7 V8.0 SP1 Update 8 (https://support.industry.siemens.com/cs/ww/en/view/109738680)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738680"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V8.1 SP1: WinCC: Update to WinCC V7.3 Update 10 (https://support.industry.siemens.com/cs/ww/en/view/109738470)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738470"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V8.1 SP1 Update 11 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V8.1 Update 2 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS 7 V8.1 Update 3 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V8.2: WinCC: Update to WinCC V7.4 Update 1 (https://support.industry.siemens.com/cs/ww/de/view/109738653)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/de/view/109738653"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V8.2 Update 1 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V8.2 Update 1 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS7 V8.2 Update 1",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Contact Customer Support: (https://support.industry.siemens.com/cs/de/en/)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/de/en/"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC Runtime Professional V13: Update to WinCC Runtime Professional V13 SP1 Update 9: (https://support.industry.siemens.com/cs/ww/en/view/109311724)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109311724"
},
{
"category": "mitigation",
"details": "Until updates can be applied, Siemens recommends the following steps to mitigate the risk: Always run WinCC, WinCC Runtime Professional, and PCS 7 stations within a trusted network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Ensure that WinCC, WinCC Runtime Professional, and PCS 7 stations communicate via encrypted channels only (e.g., activate feature \u201cEncrypted Communications\u201d in WinCC V7.3 and PCS 7 V8.1 SP1, or establish a VPN tunnel).",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Restrict access to the WinCC, WinCC Runtime Professional and PCS 7 stations to trusted entities.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Apply up-to-date application whitelisting software and virus scanners.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "For more information on these vulnerabilities and more detailed mitigation instructions, please see Siemens Security Advisory SSA-378531 at the following location: (http://www.siemens.com/cert/en/cert-security-advisories.htm)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "http://www.siemens.com/cert/en/cert-security-advisories.htm"
},
{
"category": "mitigation",
"details": "As a general security measure Siemens strongly recommends protecting network access to the WinCC and PCS 7 stations with appropriate mechanisms. Siemens advises configuring the environment according to Siemens operational guidelines in order to run the devices in a protected IT environment. (https://www.siemens.com/cert/operational-guidelines-industrial-security)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
}
]
},
{
"cve": "CVE-2016-5744",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens has produced updates for the following products and strongly encourages users to upgrade to the new versions as soon as possible: SIMATIC WinCC V7.0 SP2: Update to V7.0 SP2 Update 12 (https://support.industry.siemens.com/cs/ww/en/view/109741519)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109741519"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.0 SP3:: Update to V7.0 SP3 Update 8 (https://support.industry.siemens.com/cs/ww/en/view/109741127)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109741127"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.2: Update to WinCC V7.2 Update 13 (https://support.industry.siemens.com/cs/ww/en/view/109739416)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109739416"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.3: Update to WinCC V7.3 Update 10 (https://support.industry.siemens.com/cs/ww/en/view/109738470)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738470"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.4: Update to WinCC V7.4 Update 1 (https://support.industry.siemens.com/cs/ww/de/view/109738653)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/de/view/109738653"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V7.1 SP4 and earlier versions: WinCC: Update to WinCC V7.0 SP2 Update 12 (https://support.industry.siemens.com/cs/ww/en/view/109741519)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109741519"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V7.1 SP1 Update 21 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V7.1 SP2 Update 11 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V7.1 SP2 Update 6 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS 7 V7.1 SP4 Update 2 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V8.0 SP2: WinCC: Update to WinCC V7.2 Update 13 (https://support.industry.siemens.com/cs/ww/en/view/109739416)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109739416"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V8.0 SP1 Update 17 (https://support.industry.siemens.com/cs/ww/en/view/109738680)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738680"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V8.0 SP1 Update 6 (https://support.industry.siemens.com/cs/ww/en/view/109738680)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738680"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS 7 V8.0 SP1 Update 8 (https://support.industry.siemens.com/cs/ww/en/view/109738680)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738680"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V8.1 SP1: WinCC: Update to WinCC V7.3 Update 10 (https://support.industry.siemens.com/cs/ww/en/view/109738470)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738470"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V8.1 SP1 Update 11 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V8.1 Update 2 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS 7 V8.1 Update 3 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V8.2: WinCC: Update to WinCC V7.4 Update 1 (https://support.industry.siemens.com/cs/ww/de/view/109738653)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/de/view/109738653"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V8.2 Update 1 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V8.2 Update 1 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS7 V8.2 Update 1",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Contact Customer Support: (https://support.industry.siemens.com/cs/de/en/)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/de/en/"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC Runtime Professional V13: Update to WinCC Runtime Professional V13 SP1 Update 9: (https://support.industry.siemens.com/cs/ww/en/view/109311724)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109311724"
},
{
"category": "mitigation",
"details": "Until updates can be applied, Siemens recommends the following steps to mitigate the risk: Always run WinCC, WinCC Runtime Professional, and PCS 7 stations within a trusted network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Ensure that WinCC, WinCC Runtime Professional, and PCS 7 stations communicate via encrypted channels only (e.g., activate feature \u201cEncrypted Communications\u201d in WinCC V7.3 and PCS 7 V8.1 SP1, or establish a VPN tunnel).",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Restrict access to the WinCC, WinCC Runtime Professional and PCS 7 stations to trusted entities.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Apply up-to-date application whitelisting software and virus scanners.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "For more information on these vulnerabilities and more detailed mitigation instructions, please see Siemens Security Advisory SSA-378531 at the following location: (http://www.siemens.com/cert/en/cert-security-advisories.htm)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "http://www.siemens.com/cert/en/cert-security-advisories.htm"
},
{
"category": "mitigation",
"details": "As a general security measure Siemens strongly recommends protecting network access to the WinCC and PCS 7 stations with appropriate mechanisms. Siemens advises configuring the environment according to Siemens operational guidelines in order to run the devices in a protected IT environment. (https://www.siemens.com/cert/operational-guidelines-industrial-security)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
}
]
}
]
}
ghsa-g5pr-xc4w-x864
Vulnerability from github
Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets.
{
"affected": [],
"aliases": [
"CVE-2016-5744"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2016-07-22T15:59:00Z",
"severity": "HIGH"
},
"details": "Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets.",
"id": "GHSA-g5pr-xc4w-x864",
"modified": "2022-05-17T03:40:17Z",
"published": "2022-05-17T03:40:17Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5744"
},
{
"type": "WEB",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/92116"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1036441"
},
{
"type": "WEB",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
gsd-2016-5744
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2016-5744",
"description": "Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets.",
"id": "GSD-2016-5744"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-5744"
],
"details": "Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets.",
"id": "GSD-2016-5744",
"modified": "2023-12-13T01:21:26.014842Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-5744",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "92116",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92116"
},
{
"name": "1036441",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036441"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
},
{
"name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc:7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc:7.0:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-5744"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
"refsource": "CONFIRM",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"name": "92116",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/92116"
},
{
"name": "1036441",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1036441"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
"refsource": "MISC",
"tags": [],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": true,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2016-11-28T20:29Z",
"publishedDate": "2016-07-22T15:59Z"
}
}
}
var-201607-0466
Vulnerability from variot
Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets. The SIMATIC WinCC (Windows Control Center) window control center is Siemens' process monitoring system, providing complete monitoring and data acquisition (SCADA) functions for the industrial sector. The SIMATIC WinCC presence file contains a vulnerability. Successful exploits may allow an attacker to read arbitrary files in the context of the user running the affected application. This may aid in further attacks. Siemens SIMATIC WinCC is a set of automatic data acquisition and monitoring (SCADA) system of German Siemens (Siemens). A security vulnerability exists in Siemens SIMATIC WinCC versions 7.0 to SP3 and 7.2
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201607-0466",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "simatic wincc",
"scope": "eq",
"trust": 3.3,
"vendor": "siemens",
"version": "7.2"
},
{
"model": "simatic wincc",
"scope": "eq",
"trust": 2.5,
"vendor": "siemens",
"version": "7.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.8,
"vendor": "simatic wincc",
"version": "7.0"
},
{
"model": "simatic wincc",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "7.0 sp3 for up to 7.0"
},
{
"model": "simatic wincc update",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "7.41"
},
{
"model": "simatic wincc update",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "7.310"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "simatic wincc",
"version": "7.2"
}
],
"sources": [
{
"db": "IVD",
"id": "c953b84a-1100-47f7-a149-3e8bdff937c4"
},
{
"db": "CNVD",
"id": "CNVD-2016-05345"
},
{
"db": "BID",
"id": "92116"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004096"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-905"
},
{
"db": "NVD",
"id": "CVE-2016-5744"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:siemens:simatic_wincc_%28tia_portal%29",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004096"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Sergey Temnikov and Vladimir Dashchenko, Critical Infrastructure Defence\nTeam, Kaspersky Lab.",
"sources": [
{
"db": "BID",
"id": "92116"
}
],
"trust": 0.3
},
"cve": "CVE-2016-5744",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2016-5744",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-05345",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "c953b84a-1100-47f7-a149-3e8bdff937c4",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-94563",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-5744",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-5744",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2016-5744",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2016-05345",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201607-905",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "c953b84a-1100-47f7-a149-3e8bdff937c4",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-94563",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "c953b84a-1100-47f7-a149-3e8bdff937c4"
},
{
"db": "CNVD",
"id": "CNVD-2016-05345"
},
{
"db": "VULHUB",
"id": "VHN-94563"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004096"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-905"
},
{
"db": "NVD",
"id": "CVE-2016-5744"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets. The SIMATIC WinCC (Windows Control Center) window control center is Siemens\u0027 process monitoring system, providing complete monitoring and data acquisition (SCADA) functions for the industrial sector. The SIMATIC WinCC presence file contains a vulnerability. \nSuccessful exploits may allow an attacker to read arbitrary files in the context of the user running the affected application. This may aid in further attacks. Siemens SIMATIC WinCC is a set of automatic data acquisition and monitoring (SCADA) system of German Siemens (Siemens). A security vulnerability exists in Siemens SIMATIC WinCC versions 7.0 to SP3 and 7.2",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-5744"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004096"
},
{
"db": "CNVD",
"id": "CNVD-2016-05345"
},
{
"db": "BID",
"id": "92116"
},
{
"db": "IVD",
"id": "c953b84a-1100-47f7-a149-3e8bdff937c4"
},
{
"db": "VULHUB",
"id": "VHN-94563"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-5744",
"trust": 3.6
},
{
"db": "SIEMENS",
"id": "SSA-378531",
"trust": 2.6
},
{
"db": "ICS CERT",
"id": "ICSA-16-208-01",
"trust": 2.2
},
{
"db": "BID",
"id": "92116",
"trust": 2.0
},
{
"db": "SECTRACK",
"id": "1036441",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-201607-905",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2016-05345",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004096",
"trust": 0.8
},
{
"db": "IVD",
"id": "C953B84A-1100-47F7-A149-3E8BDFF937C4",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-94563",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "c953b84a-1100-47f7-a149-3e8bdff937c4"
},
{
"db": "CNVD",
"id": "CNVD-2016-05345"
},
{
"db": "VULHUB",
"id": "VHN-94563"
},
{
"db": "BID",
"id": "92116"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004096"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-905"
},
{
"db": "NVD",
"id": "CVE-2016-5744"
}
]
},
"id": "VAR-201607-0466",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "c953b84a-1100-47f7-a149-3e8bdff937c4"
},
{
"db": "CNVD",
"id": "CNVD-2016-05345"
},
{
"db": "VULHUB",
"id": "VHN-94563"
}
],
"trust": 1.5582639500000002
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "c953b84a-1100-47f7-a149-3e8bdff937c4"
},
{
"db": "CNVD",
"id": "CNVD-2016-05345"
}
]
},
"last_update_date": "2024-11-23T21:54:30.290000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-378531",
"trust": 0.8,
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"title": "The SIMATIC WinCC presence file contains a patch for the vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/79587"
},
{
"title": "Siemens SIMATIC WinCC Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63265"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05345"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004096"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-905"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-94563"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004096"
},
{
"db": "NVD",
"id": "CVE-2016-5744"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"trust": 2.2,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-208-01"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/92116"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1036441"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5744"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5744"
},
{
"trust": 0.3,
"url": "http://subscriber.communications.siemens.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05345"
},
{
"db": "VULHUB",
"id": "VHN-94563"
},
{
"db": "BID",
"id": "92116"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004096"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-905"
},
{
"db": "NVD",
"id": "CVE-2016-5744"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "c953b84a-1100-47f7-a149-3e8bdff937c4"
},
{
"db": "CNVD",
"id": "CNVD-2016-05345"
},
{
"db": "VULHUB",
"id": "VHN-94563"
},
{
"db": "BID",
"id": "92116"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004096"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-905"
},
{
"db": "NVD",
"id": "CVE-2016-5744"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-07-25T00:00:00",
"db": "IVD",
"id": "c953b84a-1100-47f7-a149-3e8bdff937c4"
},
{
"date": "2016-07-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05345"
},
{
"date": "2016-07-22T00:00:00",
"db": "VULHUB",
"id": "VHN-94563"
},
{
"date": "2016-07-25T00:00:00",
"db": "BID",
"id": "92116"
},
{
"date": "2016-08-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004096"
},
{
"date": "2016-07-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201607-905"
},
{
"date": "2016-07-22T15:59:01.397000",
"db": "NVD",
"id": "CVE-2016-5744"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-07-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05345"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-94563"
},
{
"date": "2016-07-25T00:00:00",
"db": "BID",
"id": "92116"
},
{
"date": "2016-08-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004096"
},
{
"date": "2016-07-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201607-905"
},
{
"date": "2024-11-21T02:54:56.460000",
"db": "NVD",
"id": "CVE-2016-5744"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201607-905"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens SIMATIC WinCC In any WinCC Vulnerability in reading station files",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004096"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201607-905"
}
],
"trust": 0.6
}
}
cnvd-2016-05345
Vulnerability from cnvd
厂商已提供漏洞修补方案,请关注厂商主页及时更新: SIMATIC WinCC V7.0 SP2及更早版本可更新至V7.0 SP2 Update 12:https://support.industry.siemens.com/cs/ww/en/view/109741519 SIMATIC WinCC V7.0 SP3可更新至V7.0 SP3 Update 8: https://support.industry.siemens.com/cs/ww/en/view/109741127 SIMATIC WinCC V7.2可更新至V7.2 Update 13: https://support.industry.siemens.com/cs/ww/en/view/109739416
| Name | ['SIEMENS SIMATIC WinCC 7.2', 'SIEMENS SIMATIC WinCC 7.0'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "92116"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2016-5744"
}
},
"description": "SIMATIC WinCC(Windows Control Center)\u89c6\u7a97\u63a7\u5236\u4e2d\u5fc3\uff0c\u662f\u897f\u95e8\u5b50\u7684\u8fc7\u7a0b\u76d1\u89c6\u7cfb\u7edf\uff0c\u4e3a\u5de5\u4e1a\u9886\u57df\u63d0\u4f9b\u5b8c\u5907\u7684\u76d1\u63a7\u4e0e\u6570\u636e\u91c7\u96c6\uff08SCADA\uff09\u529f\u80fd\u3002\r\n\r\nSIMATIC WinCC\u5b58\u5728\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e\u3002\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u53d1\u9001\u7279\u5236\u7684\u6570\u636e\u5305\u5230SIMATIC WinCC\u53ef\u63d0\u53d6\u4efb\u610f\u6587\u4ef6\u3002",
"discovererName": "Sergey Temnikov\uff0cVladimir Dashchenko",
"formalWay": "\u5382\u5546\u5df2\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u8865\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u53ca\u65f6\u66f4\u65b0\uff1a\r\nSIMATIC WinCC V7.0 SP2\u53ca\u66f4\u65e9\u7248\u672c\u53ef\u66f4\u65b0\u81f3V7.0 SP2 Update 12\uff1ahttps://support.industry.siemens.com/cs/ww/en/view/109741519\r\nSIMATIC WinCC V7.0 SP3\u53ef\u66f4\u65b0\u81f3V7.0 SP3 Update 8\uff1a\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109741127\r\nSIMATIC WinCC V7.2\u53ef\u66f4\u65b0\u81f3V7.2 Update 13\uff1a\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109739416",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-05345",
"openTime": "2016-07-25",
"patchDescription": "SIMATIC WinCC(Windows Control Center)\u89c6\u7a97\u63a7\u5236\u4e2d\u5fc3\uff0c\u662f\u897f\u95e8\u5b50\u7684\u8fc7\u7a0b\u76d1\u89c6\u7cfb\u7edf\uff0c\u4e3a\u5de5\u4e1a\u9886\u57df\u63d0\u4f9b\u5b8c\u5907\u7684\u76d1\u63a7\u4e0e\u6570\u636e\u91c7\u96c6\uff08SCADA\uff09\u529f\u80fd\u3002\r\n\r\nSIMATIC WinCC\u5b58\u5728\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e\u3002\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u53d1\u9001\u7279\u5236\u7684\u6570\u636e\u5305\u5230SIMATIC WinCC\u53ef\u63d0\u53d6\u4efb\u610f\u6587\u4ef6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "SIMATIC WinCC\u5b58\u5728\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"SIEMENS SIMATIC WinCC 7.2",
"SIEMENS SIMATIC WinCC 7.0"
]
},
"referenceLink": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
"serverity": "\u9ad8",
"submitTime": "2016-07-25",
"title": "Siemens SIMATIC WinCC\u5b58\u5728\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e"
}
CERTFR-2016-AVI-250
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans SCADA les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | Siemens WinCC V7.4 sans la mise à jour de sécurité U1 | ||
| Siemens | N/A | Siemens SINEMA Remote Connect Server versions antérieures à 1.2 | ||
| Siemens | N/A | Siemens PCS 7 V8.1 SP1 avec WinCC V7.3 sans la mise à jour de sécurité U10, SIMATIC BATCH V8.1 SP1 sans la mise à jour de sécurité U9, OpenPCS 7 V8.1 sans la mise à jour de sécurité U3 | ||
| Siemens | N/A | Siemens SIMATIC NET PC-Software versions antérieures à V13 SP2 | ||
| Siemens | N/A | Siemens WinCC V7.3 sans la mise à jour de sécurité U10 | ||
| Siemens | N/A | Siemens PCS 7 V8.2 avec WinCC V7.4 sans la mise à jour de sécurité U1, OpenPCS 7 V8.2 sans la mise à jour de sécurité U3 | ||
| Siemens | N/A | Siemens WinCC Runtime Professional V13 versions antérieures à WinCC Runtime Professional V13 SP1 U9 |
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Siemens WinCC V7.4 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siemens SINEMA Remote Connect Server versions ant\u00e9rieures \u00e0 1.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siemens PCS 7 V8.1 SP1 avec WinCC V7.3 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U10, SIMATIC BATCH V8.1 SP1 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U9, OpenPCS 7 V8.1 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siemens SIMATIC NET PC-Software versions ant\u00e9rieures \u00e0 V13 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siemens WinCC V7.3 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U10",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siemens PCS 7 V8.2 avec WinCC V7.4 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U1, OpenPCS 7 V8.2 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siemens WinCC Runtime Professional V13 versions ant\u00e9rieures \u00e0 WinCC Runtime Professional V13 SP1 U9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-5743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5743"
},
{
"name": "CVE-2016-6204",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6204"
},
{
"name": "CVE-2016-5874",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5874"
},
{
"name": "CVE-2016-5744",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5744"
}
],
"initial_release_date": "2016-07-25T00:00:00",
"last_revision_date": "2016-07-25T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SCADA SSA-453276 Siemens du 22 juillet 2016",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-453276.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SCADA SSA-119132 Siemens du 22 juillet 2016",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-119132.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SCADA SSA-378531 Siemens du 22 juillet 2016",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-378531.pdf"
}
],
"reference": "CERTFR-2016-AVI-250",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eSCADA les produits Siemens\u003c/span\u003e. Certaines d\u0027entre\nelles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans SCADA les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SCADA SSA-453276 Siemens du 22 juillet 2016",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SCADA SSA-378531 Siemens du 22 juillet 2016",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SCADA SSA-119132 Siemens du 22 juillet 2016",
"url": null
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.