Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2010-2772 |
CWE-ID | CWE-259 |
Exploitation vector | Local |
Public exploit | Vulnerability #1 is being exploited in the wild. |
Vulnerable software Subscribe |
SIMATIC PCS 7 Server applications / SCADA systems Siemens SIMATIC WinCC Server applications / SCADA systems |
Vendor | Siemens |
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU6166
Risk: High
CVSSv3.1:
CVE-ID: CVE-2010-2772
CWE-ID:
CWE-259 - Use of Hard-coded Password
Exploit availability: No
DescriptionThe vulnerability allows a local user to obtain hardcoded credentials.
The vulnerability exists due to usage of hardcoded password to access back-end database. A local user can obtain password and gain unaithorized access SCADA system.
Successful exploitation of the vulnerability may allow an attacker to gain complete control over the industrial process.
Note: this vulnerability is being actively exploited by the Stuxnet malware.
Follow vendor recommendations to resolve this issue.
SIMATIC PCS 7: All versions
Siemens SIMATIC WinCC: All versions
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?