CVE-2014-4686
Description
The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, has a hardcoded encryption key, which allows remote attackers to obtain sensitive information by extracting this key from another product installation and then employing this key during the sniffing of network traffic on TCP port 1030.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A hardcoded encryption key in Siemens SIMATIC WinCC before 7.3 lets remote attackers decrypt network traffic on TCP port 1030.
Vulnerability
The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, contains a hardcoded encryption key that is identical across installations [1]. An attacker who extracts this key from one product installation can use it to decrypt network traffic on TCP port 1030 [1].
Exploitation
An attacker needs network access to sniff traffic on TCP port 1030, but does not require authentication or physical access. The attacker must first obtain the hardcoded encryption key, which can be extracted from any other installation of the same WinCC version (before 7.3) [1]. Once the key is obtained, the attacker can passively decrypt all captured communications on that port [1].
Impact
Successful exploitation leads to disclosure of sensitive information transmitted between WinCC components over TCP port 1030 [1]. The confidentiality of the wincc system is compromised, potentially exposing project configuration data, credentials, or automation process information [1].
Mitigation
Siemens released SIMATIC WinCC version 7.3, which removes the hardcoded encryption key and implements proper key management [1]. Users should upgrade to WinCC 7.3 or later. No workaround is provided by the vendor for versions before 7.3 [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
17cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs7:*:sp1:*:*:*:*:*:*range: <=8.0
cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*+ 12 more
- cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*range: <=7.2
- cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc:7.1:sp1:*:*:*:*:*:*
- Range: <7.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.