ID

VAR-201607-0466


CVE

CVE-2016-5744


TITLE

Siemens SIMATIC WinCC In any WinCC Vulnerability in reading station files

Trust: 0.8

sources: JVNDB: JVNDB-2016-004096

DESCRIPTION

Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets. The SIMATIC WinCC (Windows Control Center) window control center is Siemens' process monitoring system, providing complete monitoring and data acquisition (SCADA) functions for the industrial sector. The SIMATIC WinCC presence file contains a vulnerability. Successful exploits may allow an attacker to read arbitrary files in the context of the user running the affected application. This may aid in further attacks. Siemens SIMATIC WinCC is a set of automatic data acquisition and monitoring (SCADA) system of German Siemens (Siemens). A security vulnerability exists in Siemens SIMATIC WinCC versions 7.0 to SP3 and 7.2

Trust: 2.7

sources: NVD: CVE-2016-5744 // JVNDB: JVNDB-2016-004096 // CNVD: CNVD-2016-05345 // BID: 92116 // IVD: c953b84a-1100-47f7-a149-3e8bdff937c4 // VULHUB: VHN-94563

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: c953b84a-1100-47f7-a149-3e8bdff937c4 // CNVD: CNVD-2016-05345

AFFECTED PRODUCTS

vendor:siemensmodel:simatic winccscope:eqversion:7.2

Trust: 3.3

vendor:siemensmodel:simatic winccscope:eqversion:7.0

Trust: 2.5

vendor:simatic winccmodel: - scope:eqversion:7.0

Trust: 0.8

vendor:siemensmodel:simatic winccscope:eqversion:7.0 sp3 for up to 7.0

Trust: 0.8

vendor:siemensmodel:simatic wincc updatescope:neversion:7.41

Trust: 0.3

vendor:siemensmodel:simatic wincc updatescope:neversion:7.310

Trust: 0.3

vendor:simatic winccmodel: - scope:eqversion:7.2

Trust: 0.2

sources: IVD: c953b84a-1100-47f7-a149-3e8bdff937c4 // CNVD: CNVD-2016-05345 // BID: 92116 // JVNDB: JVNDB-2016-004096 // CNNVD: CNNVD-201607-905 // NVD: CVE-2016-5744

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5744
value: HIGH

Trust: 1.0

NVD: CVE-2016-5744
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-05345
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201607-905
value: MEDIUM

Trust: 0.6

IVD: c953b84a-1100-47f7-a149-3e8bdff937c4
value: MEDIUM

Trust: 0.2

VULHUB: VHN-94563
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-5744
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-05345
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: c953b84a-1100-47f7-a149-3e8bdff937c4
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-94563
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-5744
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: IVD: c953b84a-1100-47f7-a149-3e8bdff937c4 // CNVD: CNVD-2016-05345 // VULHUB: VHN-94563 // JVNDB: JVNDB-2016-004096 // CNNVD: CNNVD-201607-905 // NVD: CVE-2016-5744

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-94563 // JVNDB: JVNDB-2016-004096 // NVD: CVE-2016-5744

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201607-905

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201607-905

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004096

PATCH

title:SSA-378531url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf

Trust: 0.8

title:The SIMATIC WinCC presence file contains a patch for the vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/79587

Trust: 0.6

title:Siemens SIMATIC WinCC Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63265

Trust: 0.6

sources: CNVD: CNVD-2016-05345 // JVNDB: JVNDB-2016-004096 // CNNVD: CNNVD-201607-905

EXTERNAL IDS

db:NVDid:CVE-2016-5744

Trust: 3.6

db:SIEMENSid:SSA-378531

Trust: 2.6

db:ICS CERTid:ICSA-16-208-01

Trust: 2.2

db:BIDid:92116

Trust: 2.0

db:SECTRACKid:1036441

Trust: 1.1

db:CNNVDid:CNNVD-201607-905

Trust: 0.9

db:CNVDid:CNVD-2016-05345

Trust: 0.8

db:JVNDBid:JVNDB-2016-004096

Trust: 0.8

db:IVDid:C953B84A-1100-47F7-A149-3E8BDFF937C4

Trust: 0.2

db:VULHUBid:VHN-94563

Trust: 0.1

sources: IVD: c953b84a-1100-47f7-a149-3e8bdff937c4 // CNVD: CNVD-2016-05345 // VULHUB: VHN-94563 // BID: 92116 // JVNDB: JVNDB-2016-004096 // CNNVD: CNNVD-201607-905 // NVD: CVE-2016-5744

REFERENCES

url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf

Trust: 2.6

url:https://ics-cert.us-cert.gov/advisories/icsa-16-208-01

Trust: 2.2

url:http://www.securityfocus.com/bid/92116

Trust: 1.1

url:http://www.securitytracker.com/id/1036441

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5744

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5744

Trust: 0.8

url:http://subscriber.communications.siemens.com/

Trust: 0.3

sources: CNVD: CNVD-2016-05345 // VULHUB: VHN-94563 // BID: 92116 // JVNDB: JVNDB-2016-004096 // CNNVD: CNNVD-201607-905 // NVD: CVE-2016-5744

CREDITS

Sergey Temnikov and Vladimir Dashchenko, Critical Infrastructure Defence Team, Kaspersky Lab.

Trust: 0.3

sources: BID: 92116

SOURCES

db:IVDid:c953b84a-1100-47f7-a149-3e8bdff937c4
db:CNVDid:CNVD-2016-05345
db:VULHUBid:VHN-94563
db:BIDid:92116
db:JVNDBid:JVNDB-2016-004096
db:CNNVDid:CNNVD-201607-905
db:NVDid:CVE-2016-5744

LAST UPDATE DATE

2024-08-14T13:32:31.402000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-05345date:2016-07-25T00:00:00
db:VULHUBid:VHN-94563date:2016-11-28T00:00:00
db:BIDid:92116date:2016-07-25T00:00:00
db:JVNDBid:JVNDB-2016-004096date:2016-08-01T00:00:00
db:CNNVDid:CNNVD-201607-905date:2016-07-25T00:00:00
db:NVDid:CVE-2016-5744date:2016-11-28T20:29:10.953

SOURCES RELEASE DATE

db:IVDid:c953b84a-1100-47f7-a149-3e8bdff937c4date:2016-07-25T00:00:00
db:CNVDid:CNVD-2016-05345date:2016-07-25T00:00:00
db:VULHUBid:VHN-94563date:2016-07-22T00:00:00
db:BIDid:92116date:2016-07-25T00:00:00
db:JVNDBid:JVNDB-2016-004096date:2016-08-01T00:00:00
db:CNNVDid:CNNVD-201607-905date:2016-07-25T00:00:00
db:NVDid:CVE-2016-5744date:2016-07-22T15:59:01.397