The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime generates predictable authentication tokens for cookies, which makes it easier for remote attackers to bypass authentication via a crafted cookie.
References
Link | Resource |
---|---|
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf | Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf | US Government Resource |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2012-02-03 20:55
Updated : 2024-02-04 17:54
NVD link : CVE-2011-4508
Mitre link : CVE-2011-4508
CVE.ORG link : CVE-2011-4508
JSON object : View
Products Affected
siemens
- wincc_flexible
- wincc
- wincc_flexible_runtime
- wincc_runtime_advanced
- simatic_hmi_panels
CWE
CWE-287
Improper Authentication