PT-2013-78: Buffer overflow in SIMATIC WinCC Open Architecture Vulnerable platformSIMATIC WinCC Open Architecture Version: 3.12 and earlierLink: http://www.siemens.com/Severity levelSeverity level: High Impact: Arbitrary Code Execution Access Vector: Remote CVSS v2: Base Score: 9.3 Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)CVE: CVE-2014-1697Platform descriptionSIMATIC WinCC Open Architecture is a SCADA system for visualizing and operating processes, production flows, machines and plants in all lines of business.Vulnerability descriptionThe specialists of the Positive Research center have detected a Buffer overflow vulnerability in SIMATIC WinCC Open Architecture.The SIMATIC WinCC OA integrated Web server at Port 4999/TCP might allow attackers to perform remote code execution by sending specially crafted packets without authentication.How to fixUpdate your software up to the latest versionAdvisory status 01.12.2013 - Vendor gets vulnerability details 03.02.2014 - Vendor releases fixed version and details 14.02.2014 - Public disclosureCreditsThe vulnerability was detected by Kirill Nesterov, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2013-78 http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-342587.pdf https://ics-cert.us-cert.gov/advisories/ICSA-14-035-01 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/