The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to improper input validation when processing packets sent to the WinCC server. A remote unauthenticated attacker can send a specially crafted packet and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note: this vulnerability has been exploited in targeted attacks.
Improper input validation
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to improper input validation when processing packets sent to the WinCC server. A remote unauthenticated attacker can send a specially crafted packet and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note: this vulnerability has been exploited in targeted attacks.
i
The vulnerability has been exploited in targeted attacks involving BlackEnergy Trojan.
Software:
Siemens SIMATIC WinCC
Known/fameous malware:
BlackEnergy
The vulnerability has been exploited in targeted attacks involving BlackEnergy Trojan.
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insecure DDL loading mechanism when processing STEP 7 files in SIMATIC STEP 7 and SIMATIC PCS 7 software. A remote attacker can trick the victim into opening a SETP 7 file from a remote SMB or WebDAV share, which hosts malicious .dll file, and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note: the vulnerability has been exploited in the wild by Stuxnet malware in 2010.
DDL hijacking
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insecure DDL loading mechanism when processing STEP 7 files in SIMATIC STEP 7 and SIMATIC PCS 7 software. A remote attacker can trick the victim into opening a SETP 7 file from a remote SMB or WebDAV share, which hosts malicious .dll file, and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note: the vulnerability has been exploited in the wild by Stuxnet malware in 2010.
i
The vulnerability was used by Stuxnet along with CVE-2010-2772.
Software:
SIMATIC STEP 7
Known/fameous malware:
Stuxnet
The vulnerability was used by Stuxnet along with CVE-2010-2772.
The vulnerability allows a local user to obtain hardcoded credentials.
The vulnerability exists due to usage of hardcoded password to access back-end database. A local user can obtain password and gain unaithorized access SCADA system.
Successful exploitation of the vulnerability may allow an attacker to gain complete control over the industrial process.
Note: this vulnerability is being actively exploited by the Stuxnet malware.
Hardcoded credentials
The vulnerability allows a local user to obtain hardcoded credentials.
The vulnerability exists due to usage of hardcoded password to access back-end database. A local user can obtain password and gain unaithorized access SCADA system.
Successful exploitation of the vulnerability may allow an attacker to gain complete control over the industrial process.
Note: this vulnerability is being actively exploited by the Stuxnet malware.
i
The vulnerabiilty was used by Stuxnet malware together with CVE-2012-3015.
Software:
Siemens SIMATIC WinCC
The vulnerabiilty was used by Stuxnet malware together with CVE-2012-3015.