|
|
|
|
| |
Credit:
The information has been provided by Gleb Gritsai, Alexander Zaitsev, Sergey Scherbel, Yuri Goltsev, Dmitry Serebryannikov, Sergey Bobrov, Denis Baranov, Andrey Medov and Siemens.
The original article can be found at: http://www.securityfocus.com/bid/53837
|
| |
Vulnerable Systems:
* Siemens WINCC 7.0 SP3
Attackers can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, execute arbitrary code in the context of the affected application, read arbitrary files on the system, redirect users to a potentially malicious site, access or modify data of an XML document, or cause denial-of-service conditions; other attacks may also be possible.
Vendor Status:
Siemens had issued an update for this vulnerability
Patch Availability:
http://www.automation.siemens.com/mcms/human-machine-interface/en/visualization-software/wincc-flexible/wincc-flexible-runtime/Pages/Default.aspx
CVE Information:
CVE-2012-2595
CVE-2012-2596
CVE-2012-2597
CVE-2012-2598
CVE-2012-3003
Disclosure Timeline:
Initial Release: Jun 06 2012
|
|
|
|
|