Vulnerabilities > CVE-2014-1696 - Cryptographic Issues vulnerability in Siemens Simatic Wincc Open Architecture

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
siemens
CWE-310

Summary

Siemens SIMATIC WinCC OA before 3.12 P002 January uses a weak hash algorithm for passwords, which makes it easier for remote attackers to obtain access via a brute-force attack.

Vulnerable Configurations

Part Description Count
Application
Siemens
1

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 65339 CVE(CAN) ID: CVE-2014-1696 Siemens SIMATIC WinCC 是监测控制和数据采集SCADA及人机界面HMI系统。 SIEMENS SIMATIC WinCC OA 3.12 P002之前版本使用了弱密码哈希算法,存在安全漏洞,远程攻击者通过暴力攻击,即可获取访问权限。 0 Siemens SIMATIC WinCC Open Architecture < 3.12 P002 January 厂商补丁: Siemens ------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.siemens.com/corporate-technology/pool/ http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-342587.pdf
idSSV:61422
last seen2017-11-19
modified2014-02-12
published2014-02-12
reporterRoot
titleSIEMENS SIMATIC WinCC Open Architecture不安全密码哈希漏洞