ID

VAR-201402-0260


CVE

CVE-2014-1696


TITLE

Siemens SIMATIC WinCC OA Vulnerabilities that gain access

Trust: 0.8

sources: JVNDB: JVNDB-2014-001339

DESCRIPTION

Siemens SIMATIC WinCC OA before 3.12 P002 January uses a weak hash algorithm for passwords, which makes it easier for remote attackers to obtain access via a brute-force attack. Based on the Windows platform, Siemens SIMATIC WinCC provides complete monitoring and data acquisition (SCADA) functionality for the industrial sector, from single-user systems to multi-user systems supporting redundant servers and remote web client solutions. Siemens SIMATIC WinCC Open Architecture is prone to an insecure password-hash weakness. Versions prior to SIMATIC WinCC Open Architecture 3.12 P002 are vulnerable. The system is mainly applicable to industries such as rail transit, building automation and public power supply

Trust: 2.79

sources: NVD: CVE-2014-1696 // JVNDB: JVNDB-2014-001339 // CNVD: CNVD-2014-00739 // BID: 65339 // IVD: 3b73508a-2352-11e6-abef-000c29c66e3d // VULHUB: VHN-69635 // VULMON: CVE-2014-1696

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 3b73508a-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-00739

AFFECTED PRODUCTS

vendor:siemensmodel:simatic wincc open architecturescope:lteversion:3.12

Trust: 1.0

vendor:siemensmodel:simatic wincc oascope:ltversion:3.12 p002 january

Trust: 0.8

vendor:siemensmodel:simatic wincc open architecturescope:ltversion:3.12

Trust: 0.6

vendor:siemensmodel:simatic wincc open architecturescope:eqversion:3.12

Trust: 0.6

vendor:siemensmodel:simatic wincc oascope:eqversion:3.12

Trust: 0.3

vendor:siemensmodel:simatic wincc oa p002scope:neversion:3.12

Trust: 0.3

vendor:simatic wincc open architecturemodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 3b73508a-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-00739 // BID: 65339 // JVNDB: JVNDB-2014-001339 // CNNVD: CNNVD-201402-086 // NVD: CVE-2014-1696

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-1696
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-1696
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-00739
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201402-086
value: MEDIUM

Trust: 0.6

IVD: 3b73508a-2352-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-69635
value: MEDIUM

Trust: 0.1

VULMON: CVE-2014-1696
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-1696
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2014-00739
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 3b73508a-2352-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-69635
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 3b73508a-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-00739 // VULHUB: VHN-69635 // VULMON: CVE-2014-1696 // JVNDB: JVNDB-2014-001339 // CNNVD: CNNVD-201402-086 // NVD: CVE-2014-1696

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-69635 // JVNDB: JVNDB-2014-001339 // NVD: CVE-2014-1696

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201402-086

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201402-086

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001339

PATCH

title:SSA-342587url:http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-342587.pdf

Trust: 0.8

title:Siemens SIMATIC WinCC Open Architecture patch with password leak vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/43375

Trust: 0.6

sources: CNVD: CNVD-2014-00739 // JVNDB: JVNDB-2014-001339

EXTERNAL IDS

db:NVDid:CVE-2014-1696

Trust: 3.7

db:ICS CERTid:ICSA-14-035-01

Trust: 2.9

db:SIEMENSid:SSA-342587

Trust: 2.1

db:OSVDBid:102809

Trust: 1.2

db:BIDid:65339

Trust: 1.1

db:CNNVDid:CNNVD-201402-086

Trust: 0.9

db:CNVDid:CNVD-2014-00739

Trust: 0.8

db:JVNDBid:JVNDB-2014-001339

Trust: 0.8

db:IVDid:3B73508A-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-69635

Trust: 0.1

db:VULMONid:CVE-2014-1696

Trust: 0.1

sources: IVD: 3b73508a-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-00739 // VULHUB: VHN-69635 // VULMON: CVE-2014-1696 // BID: 65339 // JVNDB: JVNDB-2014-001339 // CNNVD: CNNVD-201402-086 // NVD: CVE-2014-1696

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-14-035-01

Trust: 3.0

url:http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-342587.pdf

Trust: 2.1

url:http://osvdb.org/102809

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/90934

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1696

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1696

Trust: 0.8

url:http://www.securityfocus.com/bid/65339

Trust: 0.7

url:http://www.automation.siemens.com/mcms/human-machine-interface/en/visualization-software/scada/simatic-wincc/pages/default.aspx

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/310.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2014-00739 // VULHUB: VHN-69635 // VULMON: CVE-2014-1696 // BID: 65339 // JVNDB: JVNDB-2014-001339 // CNNVD: CNNVD-201402-086 // NVD: CVE-2014-1696

CREDITS

Gleb Gritsai, Ilya Karpov and Kirill Nesterov from Positive Technologies

Trust: 0.3

sources: BID: 65339

SOURCES

db:IVDid:3b73508a-2352-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2014-00739
db:VULHUBid:VHN-69635
db:VULMONid:CVE-2014-1696
db:BIDid:65339
db:JVNDBid:JVNDB-2014-001339
db:CNNVDid:CNNVD-201402-086
db:NVDid:CVE-2014-1696

LAST UPDATE DATE

2024-08-14T14:46:48.500000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-00739date:2014-02-13T00:00:00
db:VULHUBid:VHN-69635date:2017-08-29T00:00:00
db:VULMONid:CVE-2014-1696date:2017-08-29T00:00:00
db:BIDid:65339date:2014-02-03T00:00:00
db:JVNDBid:JVNDB-2014-001339date:2014-02-10T00:00:00
db:CNNVDid:CNNVD-201402-086date:2014-02-12T00:00:00
db:NVDid:CVE-2014-1696date:2017-08-29T01:34:27.467

SOURCES RELEASE DATE

db:IVDid:3b73508a-2352-11e6-abef-000c29c66e3ddate:2014-02-13T00:00:00
db:CNVDid:CNVD-2014-00739date:2014-02-12T00:00:00
db:VULHUBid:VHN-69635date:2014-02-07T00:00:00
db:VULMONid:CVE-2014-1696date:2014-02-07T00:00:00
db:BIDid:65339date:2014-02-03T00:00:00
db:JVNDBid:JVNDB-2014-001339date:2014-02-10T00:00:00
db:CNNVDid:CNNVD-201402-086date:2014-02-12T00:00:00
db:NVDid:CVE-2014-1696date:2014-02-07T04:52:04.380