CVE-2011-4879
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
03/02/2012
Last modified:
11/04/2025
Description
miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not properly handle URIs beginning with a 0xfa character, which allows remote attackers to read data from arbitrary memory locations or cause a denial of service (application crash) via a crafted POST request.
Impact
Base Score 2.0
8.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc_flexible:2008:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc_flexible:2008:sp2:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc:*:sp2:*:*:*:*:*:* | v11 (including) | |
| cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc:v11:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:* | ||
| cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://aluigi.org/adv/winccflex_1-adv.txt
- http://www.exploit-db.com/exploits/18166
- http://www.osvdb.org/77384
- http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf
- http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf
- http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71453
- http://aluigi.org/adv/winccflex_1-adv.txt
- http://www.exploit-db.com/exploits/18166
- http://www.osvdb.org/77384
- http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf
- http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02.pdf
- http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-332-02A.pdf
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71453



