Siemens SIMATIC WinCC (TIA Portal) < 14 SP1 XXE Vulnerability

Medium Nessus Plugin ID 102991


An application installed on the remote host is affected by multiple denial of service vulnerabilities.


The version of Siemens SIMATIC WinCC (TIA Portal) installed on the remote host is prior to 14 service pack 1 (1400.100.1201.1). It is, therefore, affected by an XML External Entity Injection Vulnerability. A flaw in the OPC discovery server, that is triggered during the handling of a specially crafted packet, may allow a remote attacker to gain access to certain resources or consume excessive resources.


Upgrade to Siemens SIMATIC WinCC (TIA Portal) version 14 SP1 (1400.100.1201.1) or later.

See Also

Plugin Details

Severity: Medium

ID: 102991

File Name: scada_siemens_tia_wincc_SSA-535640.nbin

Version: 1.34

Type: local

Family: SCADA

Published: 2017/09/07

Updated: 2020/09/14

Dependencies: 81577

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2017-12069

CVSS v2.0

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 8.2

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:siemens:wincc, cpe:/a:siemens:simatic_tiaportal

Required KB Items: installed_sw/Siemens SIMATIC WinCC Totally Integrated Automation Portal

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/08/30

Vulnerability Publication Date: 2017/08/30

Reference Information

CVE: CVE-2017-12069

BID: 100559

ICSA: 17-243-01

IAVB: 2017-B-0120