Siemens SIMATIC WinCC Default Password Authentication Bypass

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote database service has a default account configured.

Description :

The remote instance of SQL Server has the default 'WinCCConnect'
account enabled with its default password set.

An attacker may leverage this flaw to execute commands against the
remote host, as well as read the content of the WinCC database if
present.

See also :

http://it.slashdot.org/comments.pl?sid=1721020&cid=32920758
http://www.nessus.org/u?dfddaa04
http://www.nessus.org/u?fca06efc

Solution :

Filter incoming traffic to this port or change the account password.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 47759 ()

Bugtraq ID: 41753

CVE ID: CVE-2010-2772

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial