PT-2013-77: Using a weak hashing algorithm in SIMATIC WinCC Open Architecture
(PT-2013-77) Positive Technologies Security Advisory
Using a weak hashing algorithm in SIMATIC WinCC Open Architecture
SIMATIC WinCC Open Architecture
Version: 3.12 and earlier
Severity level: High
Impact: Privilege Gaining
Access Vector: Remote
Base Score: 7.5
SIMATIC WinCC Open Architecture is a SCADA system for visualizing and operating processes, production flows, machines and plants in all lines of business.
The specialists of the Positive Research center have detected an Using a weak hashing algorithm vulnerability in SIMATIC WinCC Open Architecture.
The SIMATIC WinCC OA server application has a weak hashing algorithm for project users’ credentials. Attackers might be able to escalate their privileges within the affected WinCC OA server application using a brute-force attack.
How to fix
Update your software up to the latest version
29.05.2013 - Vendor gets vulnerability details
03.02.2014 - Vendor releases fixed version and details
14.02.2014 - Public disclosure
The vulnerability was detected by Gleb Gritsai and Ilya Karpov, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research:
About Positive Technologies
Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. Our solutions work seamlessly across your entire business: securing applications in development; assessing your network and application vulnerabilities; assuring compliance with regulatory requirements; and blocking real-time attacks. Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, and distinction as the #1 fastest growing Security and Vulnerability Management firm in 2012, as shown in an IDC report*. To learn more about Positive Technologies please visit www.ptsecurity.com
*Source: IDC Worldwide Security and Vulnerability Management 2013-2017 Forecast and 2012 Vendor Shares, doc #242465, August 2013. Based on year-over-year revenue growth in 2012 for vendors with revenues of $20M+