CVE-2011-4879

Siemens Wincc Flexible < v11 - Improper Input Validation

Title source: rule
STIX 2.1

Description

miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not properly handle URIs beginning with a 0xfa character, which allows remote attackers to read data from arbitrary memory locations or cause a denial of service (application crash) via a crafted POST request.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Luigi Auriemma · textdoswindows
https://www.exploit-db.com/exploits/18166

References (8)

Core 8
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/18166
Various Sources x_refsource_misc
http://aluigi.org/adv/winccflex_1-adv.txt
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/77384
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/71453
US Government Resource x_refsource_misc
http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf

Scores

EPSS 0.3429
EPSS Percentile 97.0%

Details

CWE
CWE-20
Status published
Products (13)
siemens/simatic_hmi_panels comfort_panels
siemens/simatic_hmi_panels mobile_panels
siemens/simatic_hmi_panels mp
siemens/simatic_hmi_panels op
siemens/simatic_hmi_panels tp
siemens/wincc v11 (2 CPE variants)
siemens/wincc < v11
siemens/wincc_flexible 2004
siemens/wincc_flexible 2005
siemens/wincc_flexible 2007
... and 3 more
Published Feb 03, 2012
Tracked Since Feb 18, 2026