Full Disclosure mailing list archives
Please update your plant. On recent WinCC SCADA fixes
From: scadastrangelove <scadastrangelove () gmail com>
Date: Fri, 28 Jun 2013 00:02:39 +0400
Few days ago Siemens published update for WinCC 7.2 SCADA to fix several vulnerabilities discovered by SCADA StrangeLove team. CVE-2013-3957 – most dangers one. Simple SQL Injection because some configuration and architectural issues an attacker can execute arbitrary code in context of SQL server. This vulnerability can be exploited not only via WebNavigator (e.g. HTTP), but via WinCC Runtime Client (e.g. OPC). So Cisco Applied Mitigation Bulletin 29768 http://tools.cisco.com/security/center/viewAlert.x?alertId=29768 should be fixed to filter OPC traffic also. CVE-2013-3958 and CVE-2013-3959 is funny stuff because… Because hardcoded accounts are always funny. Credits: Alexander Tlyapov, Sergey Gordeychik and Timur Yunusov. Links: http://scadastrangelove.blogspot.com/2013/06/wincc-vulnerabilities-fixes.html
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Please update your plant. On recent WinCC SCADA fixes scadastrangelove (Jun 27)