Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2011-4879Improper Input Validation in Siemens Wincc

Severity
8.5HIGHNVD
EPSS
34.3%
top 3.01%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 3
Latest updateMay 17

Description

miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not properly handle URIs beginning with a 0xfa character, which allows remote attackers to read data from arbitrary memory locations or cause a denial of service (application crash) via a crafted POST request.

CVSS vector

AV:N/AC:L/C:P/I:N/A:CExploitability: 10.0 | Impact: 7.8

Affected Packages4 packages

🔴Vulnerability Details

2
GHSA
GHSA-m28h-wwg8-644c: miniweb2022-05-17
CVEList
CVE-2011-4879: miniweb2012-02-03

💥Exploits & PoCs

1
Exploit-DB
Siemens SIMATIC WinCC Flexible (Runtime) - Multiple Vulnerabilities2011-11-28
CVE-2011-4879 — Improper Input Validation in Siemens | cvebase