[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAJ+7+cAQi8=wgF2aMSY8BpTK_61jM52F_8aVBwm7-eWNBbzqqQ@mail.gmail.com>
Date: Fri, 28 Jun 2013 00:02:39 +0400
From: scadastrangelove <scadastrangelove@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Please update your plant. On recent WinCC SCADA
fixes
Few days ago Siemens published update for WinCC 7.2 SCADA to fix several
vulnerabilities discovered by SCADA StrangeLove team.
CVE-2013-3957 – most dangers one. Simple SQL Injection because some
configuration and architectural issues an attacker can execute arbitrary
code in context of SQL server. This vulnerability can be exploited not only
via WebNavigator (e.g. HTTP), but via WinCC Runtime Client (e.g. OPC). So
Cisco Applied Mitigation Bulletin 29768
http://tools.cisco.com/security/center/viewAlert.x?alertId=29768 should be
fixed to filter OPC traffic also.
CVE-2013-3958 and CVE-2013-3959 is funny stuff because… Because hardcoded
accounts are always funny.
Credits:
Alexander Tlyapov, Sergey Gordeychik and Timur Yunusov.
Links:
http://scadastrangelove.blogspot.com/2013/06/wincc-vulnerabilities-fixes.html
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists