CVE-2011-4879

critical

Description

miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not properly handle URIs beginning with a 0xfa character, which allows remote attackers to read data from arbitrary memory locations or cause a denial of service (application crash) via a crafted POST request.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/71453

http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf

http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf

http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf

http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf

http://www.osvdb.org/77384

http://www.exploit-db.com/exploits/18166

http://aluigi.org/adv/winccflex_1-adv.txt

Details

Source: Mitre, NVD

Published: 2012-02-03

Updated: 2017-08-29

Risk Information

CVSS v2

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C

Severity: High

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Severity: Critical