Siemens SIMATIC WinCC Default Password Authentication Bypass

This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.

Synopsis :

The remote database service has a default account configured.

Description :

The remote instance of SQL Server has the default 'WinCCConnect'
account enabled with its default password set.

An attacker may leverage this flaw to execute commands against the
remote host, as well as read the content of the WinCC database if

See also :

Solution :

Filter incoming traffic to this port or change the account password.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 47759 ()

Bugtraq ID: 41753

CVE ID: CVE-2010-2772

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now