Zero-day vulnerability in Siemens SIMATIC WinCC

Improper input validation

The vulnerability has been exploited in targeted attacks involving BlackEnergy Trojan.

Known malware:


Vulnerability details

Advisory: SB2014121901 - Two vulnerabilities in Siemens SIMATIC WinCC

Vulnerable component: Siemens SIMATIC WinCC

CVE-ID: CVE-2014-8551

CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C

CWE-ID: CWE-20 - Improper Input Validation


The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to improper input validation when processing packets sent to the WinCC server. A remote unauthenticated attacker can send a specially crafted packet and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Note: this vulnerability has been exploited in targeted attacks.

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.