Siemens SIMATIC WinCC Default Password Authentication Bypass

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote database service has a default account configured.

Description :

The remote instance of SQL Server has the default 'WinCCConnect'
account enabled with its default password set.

An attacker may leverage this flaw to execute commands against the
remote host, as well as read the content of the WinCC database if
present.

See also :

http://it.slashdot.org/comments.pl?sid=1721020&cid=32920758
http://www.nessus.org/u?dfddaa04
http://www.nessus.org/u?fca06efc

Solution :

Filter incoming traffic to this port or change the account password.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 47759 ()

Bugtraq ID: 41753

CVE ID: CVE-2010-2772