7.8

CVE-2010-2772

Media report
Exploit

Siemens Simatic WinCC and PCS 7 SCADA system uses a hard-coded password, which allows local users to access a back-end database and gain privileges, as demonstrated in the wild in July 2010 by the Stuxnet worm, a different vulnerability than CVE-2010-2568.

Data is provided by the National Vulnerability Database (NVD)
SiemensSimatic Wincc Version6.2
SiemensSimatic Wincc Version7.0
SiemensSimatic Pcs 7 Version6.0
SiemensSimatic Pcs 7 Version6.1
SiemensSimatic Pcs 7 Version7.0 Update-
SiemensSimatic Pcs 7 Version7.0 Updatesp1
SiemensSimatic Pcs 7 Version7.1
SiemensSimatic Pcs 7 Version7.1 Updatesp1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.08% 0.243
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE-798 Use of Hard-coded Credentials

The product contains hard-coded credentials, such as a password or cryptographic key.

http://ics-cert.us-cert.gov/advisories/ICSA-12-205-01
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/41753
Third Party Advisory
Broken Link
VDB Entry
http://www.wired.com/threatlevel/2010/07/siemens-scada/
Third Party Advisory
Press/Media Coverage