Unrated severityNVD Advisory· Published Jun 8, 2012· Updated Apr 29, 2026
CVE-2012-2596
CVE-2012-2596
Description
The XPath functionality in unspecified web applications in Siemens WinCC 7.0 SP3 before Update 2 does not properly handle special characters in parameters, which allows remote authenticated users to read or modify settings via a crafted URL, related to an "XML injection" attack.
Affected products
2cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc:7.0:sp3:update_1:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdfnvdVendor Advisory
- www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdfnvdUS Government Resource
News mentions
0No linked articles in our index yet.