Hardcoded credentials in Siemens SIMATIC WinCC and PSC 7 SCADA systems



Published: 2010-07-21 | Updated: 2017-03-24
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2010-2772
CWE-ID CWE-259
Exploitation vector Local
Public exploit Vulnerability #1 is being exploited in the wild.
Vulnerable software
Subscribe
SIMATIC PCS 7
Server applications / SCADA systems

Siemens SIMATIC WinCC
Server applications / SCADA systems

Vendor Siemens

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Hardcoded credentials

EUVDB-ID: #VU6166

Risk: High

CVSSv3.1:

CVE-ID: CVE-2010-2772

CWE-ID: CWE-259 - Use of Hard-coded Password

Exploit availability: No

Description

The vulnerability allows a local user to obtain hardcoded credentials.

The vulnerability exists due to usage of hardcoded password to access back-end database. A local user can obtain password and gain unaithorized access SCADA system.

Successful exploitation of the vulnerability may allow an attacker to gain complete control over the industrial process.

Note: this vulnerability is being actively exploited by the Stuxnet malware.

Mitigation

Follow vendor recommendations to resolve this issue.

Vulnerable software versions

SIMATIC PCS 7: All versions

Siemens SIMATIC WinCC: All versions


CPE2.3 External links

http://support.industry.siemens.com/cs/document/43876783/simatic-wincc-simatic-pcs-7%3A-information...

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###