ID

VAR-201202-0044


CVE

CVE-2011-4509


TITLE

plural Siemens Product HMI Web Vulnerability to gain access rights on the server

Trust: 0.8

sources: JVNDB: JVNDB-2012-001311

DESCRIPTION

The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime has an improperly selected default password for the administrator account, which makes it easier for remote attackers to obtain access via a brute-force approach involving many HTTP requests. Siemens SIMATIC WinCC is a multi-user system that provides complete monitoring and data acquisition (SCADA) functionality for the industrial sector, from single-user systems to redundant server and remote web client solutions. The default management password exists for multiple Siemens SIMATIC products. The default account password for the WEB interface is \"Administrator: 100\", and the password \"100\" can also be used for the VNC service. If the user changes the password containing special characters, the system will put the password. Reset to \"100\". The following products are affected by this vulnerability: SIMATIC WinCC Flexible 2004 through 2008 SP2SIMATIC WinCC V11, V11 SP1, and V11 SP2 SIMATIC HMI TP, OP, MP, Mobile, and Comfort Series Panels Successful exploits allow an attacker to log in with user or administrator privileges Affect the system. An attacker can exploit these issues to bypass intended security restrictions and gain access to the affected application. Successfully exploiting these issues may lead to further attacks. The Siemens SIMATIC HMI product family is used as the human-machine interface between the corresponding PLC and the operator

Trust: 2.7

sources: NVD: CVE-2011-4509 // JVNDB: JVNDB-2012-001311 // CNVD: CNVD-2011-5449 // BID: 51177 // IVD: 2875d28a-2354-11e6-abef-000c29c66e3d // VULHUB: VHN-52454

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 2875d28a-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-5449

AFFECTED PRODUCTS

vendor:siemensmodel:simatic hmi panelsscope:eqversion:mp

Trust: 2.4

vendor:siemensmodel:simatic hmi panelsscope:eqversion:op

Trust: 2.4

vendor:siemensmodel:simatic hmi panelsscope:eqversion:tp

Trust: 2.4

vendor:siemensmodel:simatic wincc flexiblescope:eqversion:2008

Trust: 1.7

vendor:siemensmodel:simatic wincc flexiblescope:eqversion:2007

Trust: 1.7

vendor:siemensmodel:simatic wincc flexiblescope:eqversion:2005

Trust: 1.7

vendor:siemensmodel:simatic wincc flexiblescope:eqversion:2004

Trust: 1.7

vendor:siemensmodel:simatic winccscope:eqversion:v11

Trust: 1.7

vendor:siemensmodel:wincc flexiblescope:eqversion:2008

Trust: 1.6

vendor:siemensmodel:simatic hmi panelsscope:eqversion:comfort_panels

Trust: 1.6

vendor:siemensmodel:wincc runtime advancedscope:eqversion:v11

Trust: 1.6

vendor:siemensmodel:winccscope:eqversion:v11

Trust: 1.6

vendor:siemensmodel:simatic hmi panelsscope:eqversion:mobile_panels

Trust: 1.6

vendor:siemensmodel:wincc flexiblescope:eqversion:2007

Trust: 1.6

vendor:siemensmodel:wincc flexiblescope:eqversion:2004

Trust: 1.0

vendor:siemensmodel:wincc flexible runtimescope:eqversion:*

Trust: 1.0

vendor:siemensmodel:wincc flexiblescope:eqversion:2005

Trust: 1.0

vendor:siemensmodel:simatic wincc flexible sp1scope:eqversion:2008

Trust: 0.9

vendor:siemensmodel:simatic wincc flexible sp2scope:eqversion:2008

Trust: 0.9

vendor:siemensmodel:simatic wincc flexible sp1scope:eqversion:2005

Trust: 0.9

vendor:siemensmodel:simatic wincc flexible runtimescope:eqversion:0

Trust: 0.9

vendor:siemensmodel:simatic hmi panelsscope:eqversion:0

Trust: 0.9

vendor:siemensmodel:simatic wincc sp2scope:eqversion:v11

Trust: 0.9

vendor:siemensmodel:simatic wincc sp1scope:eqversion:v11

Trust: 0.9

vendor:siemensmodel:simatic winccscope:eqversion:0

Trust: 0.9

vendor:siemensmodel:simatic hmi panelsscope:eqversion:comfort panels

Trust: 0.8

vendor:siemensmodel:simatic hmi panelsscope:eqversion:mobile panels

Trust: 0.8

vendor:siemensmodel:simatic wincc flexible rumtimescope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic wincc runtime advancedscope:eqversion:v11

Trust: 0.8

vendor:siemensmodel:wincc flexible runtimescope: - version: -

Trust: 0.6

vendor:wincc flexiblemodel: - scope:eqversion:2004

Trust: 0.2

vendor:wincc flexiblemodel: - scope:eqversion:2005

Trust: 0.2

vendor:wincc flexiblemodel: - scope:eqversion:2007

Trust: 0.2

vendor:wincc flexiblemodel: - scope:eqversion:2008

Trust: 0.2

vendor:winccmodel: - scope:eqversion:v11

Trust: 0.2

vendor:simatic hmi panelsmodel:comfort panelsscope: - version: -

Trust: 0.2

vendor:simatic hmi panelsmodel:mobile panelsscope: - version: -

Trust: 0.2

vendor:simatic hmi panelsmodel:mpscope: - version: -

Trust: 0.2

vendor:simatic hmi panelsmodel:opscope: - version: -

Trust: 0.2

vendor:simatic hmi panelsmodel:tpscope: - version: -

Trust: 0.2

vendor:wincc runtime advancedmodel: - scope:eqversion:v11

Trust: 0.2

vendor:wincc flexible runtimemodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 2875d28a-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-5449 // BID: 51177 // JVNDB: JVNDB-2012-001311 // CNNVD: CNNVD-201112-423 // NVD: CVE-2011-4509

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-4509
value: HIGH

Trust: 1.0

NVD: CVE-2011-4509
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201112-423
value: CRITICAL

Trust: 0.6

IVD: 2875d28a-2354-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULHUB: VHN-52454
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-4509
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 2875d28a-2354-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-52454
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 2875d28a-2354-11e6-abef-000c29c66e3d // VULHUB: VHN-52454 // JVNDB: JVNDB-2012-001311 // CNNVD: CNNVD-201112-423 // NVD: CVE-2011-4509

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-52454 // JVNDB: JVNDB-2012-001311 // NVD: CVE-2011-4509

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201112-423

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201112-423

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001311

PATCH

title:SSA-345442url:http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf

Trust: 0.8

title:ソリューションパートナーurl:http://www.automation.siemens.com/automation/jp/ja/solutionpartner/pages/default.aspx

Trust: 0.8

title:Top Pageurl:http://www.siemens.com/entry/jp/ja/

Trust: 0.8

title:Patch for multiple Siemens SIMATIC Product Verification Bypass Vulnerabilities (CNVD-2011-5449)url:https://www.cnvd.org.cn/patchInfo/show/72709

Trust: 0.6

sources: CNVD: CNVD-2011-5449 // JVNDB: JVNDB-2012-001311

EXTERNAL IDS

db:NVDid:CVE-2011-4509

Trust: 3.6

db:ICS CERTid:ICSA-12-030-01

Trust: 2.5

db:SIEMENSid:SSA-345442

Trust: 1.7

db:CNNVDid:CNNVD-201112-423

Trust: 0.9

db:BIDid:51177

Trust: 0.9

db:CNVDid:CNVD-2011-5449

Trust: 0.8

db:JVNDBid:JVNDB-2012-001311

Trust: 0.8

db:NSFOCUSid:18390

Trust: 0.6

db:ICS CERTid:ICSA-11-356-01

Trust: 0.3

db:ICS CERTid:ICSA-12-030-01A

Trust: 0.3

db:IVDid:2875D28A-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-52454

Trust: 0.1

sources: IVD: 2875d28a-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2011-5449 // VULHUB: VHN-52454 // BID: 51177 // JVNDB: JVNDB-2012-001311 // CNNVD: CNNVD-201112-423 // NVD: CVE-2011-4509

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-030-01.pdf

Trust: 2.5

url:http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4509

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4509

Trust: 0.8

url:http://xs-sniper.com/blog/2011/12/20/the-siemens-simatic-remote-authentication-bypass-that-doesnt-exist/http

Trust: 0.6

url:http://www.securityfocus.com/bid/51177

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18390

Trust: 0.6

url:http://www.automation.siemens.com/mcms/human-machine-interface/en/visualization-software/pages/default.aspx

Trust: 0.3

url:http://www.automation.siemens.com/mcms/human-machine-interface/en/visualization-software/wincc-flexible/wincc-flexible-runtime/user-interface/pages/default.aspx

Trust: 0.3

url:http://xs-sniper.com/blog/2011/12/20/the-siemens-simatic-remote-authentication-bypass-that-doesnt-exist/

Trust: 0.3

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-030-01a.pdf

Trust: 0.3

url:http://www.us-cert.gov/control_systems/pdf/icsa-11-356-01.pdf

Trust: 0.3

sources: CNVD: CNVD-2011-5449 // VULHUB: VHN-52454 // BID: 51177 // JVNDB: JVNDB-2012-001311 // CNNVD: CNNVD-201112-423 // NVD: CVE-2011-4509

CREDITS

Billy Rios and Terry McCorkle

Trust: 0.9

sources: BID: 51177 // CNNVD: CNNVD-201112-423

SOURCES

db:IVDid:2875d28a-2354-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2011-5449
db:VULHUBid:VHN-52454
db:BIDid:51177
db:JVNDBid:JVNDB-2012-001311
db:CNNVDid:CNNVD-201112-423
db:NVDid:CVE-2011-4509

LAST UPDATE DATE

2024-11-23T21:46:29.700000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-5449date:2016-03-15T00:00:00
db:VULHUBid:VHN-52454date:2012-02-06T00:00:00
db:BIDid:51177date:2012-04-18T21:20:00
db:JVNDBid:JVNDB-2012-001311date:2012-02-08T00:00:00
db:CNNVDid:CNNVD-201112-423date:2011-12-26T00:00:00
db:NVDid:CVE-2011-4509date:2024-11-21T01:32:26.890

SOURCES RELEASE DATE

db:IVDid:2875d28a-2354-11e6-abef-000c29c66e3ddate:2011-12-26T00:00:00
db:CNVDid:CNVD-2011-5449date:2011-12-26T00:00:00
db:VULHUBid:VHN-52454date:2012-02-03T00:00:00
db:BIDid:51177date:2011-12-22T00:00:00
db:JVNDBid:JVNDB-2012-001311date:2012-02-08T00:00:00
db:CNNVDid:CNNVD-201112-423date:1900-01-01T00:00:00
db:NVDid:CVE-2011-4509date:2012-02-03T20:55:01.297