CVE-2011-4877
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
03/02/2012
Last modified:
11/04/2025
Description
HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to cause a denial of service (application crash) by sending crafted data over TCP.
Impact
Base Score 2.0
7.10
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://aluigi.org/adv/winccflex_1-adv.txt
- http://www.exploit-db.com/exploits/18166
- http://www.osvdb.org/77382
- http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf
- http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf
- http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71451
- http://aluigi.org/adv/winccflex_1-adv.txt
- http://www.exploit-db.com/exploits/18166
- http://www.osvdb.org/77382
- http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf
- http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf
- http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71451



