Siemens SIMATIC HMI Comfort Panel Webserver Header Injection input validation
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.4 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Siemens SIMATIC HMI Comfort Panel, SIMATIC HMI Comfort Outdoor Panel, SIMATIC HMI KTP Mobile Panel and SIMATIC WinCC and classified as critical. The affected element is an unknown function of the component Webserver. Executing a manipulation can lead to input validation (Header Injection). This vulnerability is handled as CVE-2018-13814. The attack can be executed remotely. There is not any exploit available. It is suggested to upgrade the affected component. Once again VulDB remains the best source for vulnerability data.
Details
A vulnerability classified as critical was found in Siemens SIMATIC HMI Comfort Panel, SIMATIC HMI Comfort Outdoor Panel, SIMATIC HMI KTP Mobile Panel and SIMATIC WinCC (SCADA Software) (the affected version is unknown). This vulnerability affects an unknown code of the component Webserver. The manipulation with an unknown input leads to a input validation vulnerability (Header Injection). The CWE definition for the vulnerability is CWE-20. The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V14), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V14), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V14), SIMATIC WinCC Runtime Advanced (All versions < V14), SIMATIC WinCC Runtime Professional (All versions < V14), SIMATIC WinCC (TIA Portal) (All versions < V14), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server (port 80/tcp and port 443/tcp) of the affected devices could allow an attacker to inject HTTP headers. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
The bug was discovered 11/13/2018. The weakness was released 12/13/2018 (Website). The advisory is shared for download at cert-portal.siemens.com. This vulnerability was named CVE-2018-13814 since 07/10/2018. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Successful exploitation requires user interaction by the victim. There are neither technical details nor an exploit publicly available.
The vulnerability was handled as a non-public zero-day exploit for at least 30 days. During that time the estimated underground price was around $5k-$25k.
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at SecurityFocus (BID 105931†). Entries connected to this vulnerability are available at VDB-127935 and VDB-127934. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.siemens.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.6VulDB Meta Temp Score: 7.4
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 8.8
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Name: Header InjectionClass: Input validation / Header Injection
CWE: CWE-20
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
07/10/2018 🔍11/13/2018 🔍
11/13/2018 🔍
12/13/2018 🔍
12/13/2018 🔍
12/14/2018 🔍
06/18/2023 🔍
Sources
Vendor: siemens.comAdvisory: ssa-944083
Status: Not defined
Confirmation: 🔍
CVE: CVE-2018-13814 (🔍)
GCVE (CVE): GCVE-0-2018-13814
GCVE (VulDB): GCVE-100-127936
SecurityFocus: 105931 - Multiple Siemens Products CVE-2018-13814 HTTP Header Injection Vulnerability
See also: 🔍
Entry
Created: 12/14/2018 07:40 AMUpdated: 06/18/2023 05:36 PM
Changes: 12/14/2018 07:40 AM (61), 04/20/2020 06:18 PM (4), 06/18/2023 05:36 PM (4)
Complete: 🔍
Cache ID: 244:755:40
No comments yet. Languages: en.
Please log in to comment.