CVE-2014-4686
Summary
| CVE | CVE-2014-4686 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-07-24 14:55:00 UTC |
| Updated | 2014-07-25 14:59:00 UTC |
| Description | The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, has a hardcoded encryption key, which allows remote attackers to obtain sensitive information by extracting this key from another product installation and then employing this key during the sniffing of network traffic on TCP port 1030. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Siemens | Simatic Pcs7 | 7.1 | sp3 | All | All |
| Application | Siemens | Simatic Pcs7 | 8.0 | All | All | All |
| Application | Siemens | Simatic Pcs7 | 7.1 | sp3 | All | All |
| Application | Siemens | Simatic Pcs7 | 8.0 | All | All | All |
| Application | Siemens | Simatic Pcs7 | All | sp1 | All | All |
| Application | Siemens | Wincc | 5.0 | All | All | All |
| Application | Siemens | Wincc | 5.0 | sp1 | All | All |
| Application | Siemens | Wincc | 6.0 | All | All | All |
| Application | Siemens | Wincc | 6.0 | sp2 | All | All |
| Application | Siemens | Wincc | 6.0 | sp3 | All | All |
| Application | Siemens | Wincc | 6.0 | sp4 | All | All |
| Application | Siemens | Wincc | 7.0 | All | All | All |
| Application | Siemens | Wincc | 7.0 | sp1 | All | All |
| Application | Siemens | Wincc | 7.0 | sp2 | All | All |
| Application | Siemens | Wincc | 7.0 | sp3 | All | All |
| Application | Siemens | Wincc | 7.1 | All | All | All |
| Application | Siemens | Wincc | 7.1 | sp1 | All | All |
| Application | Siemens | Wincc | 5.0 | All | All | All |
| Application | Siemens | Wincc | 5.0 | sp1 | All | All |
| Application | Siemens | Wincc | 6.0 | All | All | All |
| Application | Siemens | Wincc | 6.0 | sp2 | All | All |
| Application | Siemens | Wincc | 6.0 | sp3 | All | All |
| Application | Siemens | Wincc | 6.0 | sp4 | All | All |
| Application | Siemens | Wincc | 7.0 | All | All | All |
| Application | Siemens | Wincc | 7.0 | sp1 | All | All |
| Application | Siemens | Wincc | 7.0 | sp2 | All | All |
| Application | Siemens | Wincc | 7.0 | sp3 | All | All |
| Application | Siemens | Wincc | 7.1 | All | All | All |
| Application | Siemens | Wincc | 7.1 | sp1 | All | All |
| Application | Siemens | Wincc | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Siemens | CONFIRM | www.siemens.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.