Discover the impact of CVE-2017-6867 affecting Siemens SIMATIC WinCC software versions. Learn about the vulnerability, affected systems, exploitation mechanism, and mitigation steps.
Siemens SIMATIC WinCC software versions V7.3 (prior to Upd 11) and V7.4 (prior to SP1), SIMATIC WinCC Runtime Professional versions V13 (prior to SP2) and V14 (prior to SP1), and SIMATIC WinCC (TIA Portal) Professional versions V13 (prior to SP2) and V14 (prior to SP1) are affected by a security flaw that could allow an authenticated attacker to disrupt services.
Understanding CVE-2017-6867
A vulnerability in Siemens SIMATIC WinCC software versions that could enable an authenticated attacker to disrupt services.
What is CVE-2017-6867?
Siemens SIMATIC WinCC software versions V7.3, V7.4, SIMATIC WinCC Runtime Professional V13, V14, and SIMATIC WinCC (TIA Portal) Professional V13, V14 are vulnerable to a flaw that could be exploited by an authenticated attacker.
The Impact of CVE-2017-6867
The vulnerability could allow an authenticated attacker, part of the "administrators" group, to disrupt services by sending crafted messages to the DCOM interface.
Technical Details of CVE-2017-6867
Siemens SIMATIC WinCC software vulnerability details.
Vulnerability Description
The flaw allows an authenticated attacker to disrupt services by sending specific messages to the DCOM interface.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by an authenticated attacker with membership in the "administrators" group.
Mitigation and Prevention
Steps to mitigate and prevent the CVE-2017-6867 vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates