Skip to content ↓ | Skip to navigation ↓

ICS-CERT has issued an advisory regarding two critical vulnerabilities in Siemens SCADA software.

The SIMANTIC WinCC, SIMANTIC PCS7 and TIA Portal V13 (which includes a WinCC runtime) are all vulnerable.

There are two vulnerabilities listed in the advisory that can be exploited remotely:

  • CVE-2014-8551  The vulnerability has a CVSS score of 10. It is remotely exploitable with a low level of complexity to execute and with a high impact score (10). The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to execute arbitrary code via crafted packets.
  • CVE-2014-8552  The vulnerability has a CVSS score of 7.8. It is remotely exploitable with a low level of complexity to execute with a low impact score(2.9). The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to read arbitrary files via crafted packets.

The advisory indicates that active exploits targeting these vulnerabilities are potentially available. Indicators also exist that this vulnerability may have been exploited during a recent campaign.

For more information, review the ICS-CERT advisory.