Use of Client-Side Authentication in Siemens WinCC OA



Published: 2022-06-22
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-33139
CWE-ID CWE-603
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SIMATIC WinCC OA
Server applications / SCADA systems

Vendor Siemens

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Use of Client-Side Authentication

EUVDB-ID: #VU64575

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-33139

CWE-ID: CWE-603 - Use of Client-Side Authentication

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected applications use client-side only authentication when neither server-side authentication nor Kerberos authentication is enabled. A remote attacker can impersonate other users or exploit the client-server protocol without being authenticated.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SIMATIC WinCC OA: 3.16 - 3.18

External links

http://cert-portal.siemens.com/productcert/pdf/ssa-111512.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###