VYPR
Unrated severityNVD Advisory· Published Jul 24, 2014· Updated May 6, 2026

CVE-2014-4686

CVE-2014-4686

Description

The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, has a hardcoded encryption key, which allows remote attackers to obtain sensitive information by extracting this key from another product installation and then employing this key during the sniffing of network traffic on TCP port 1030.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A hardcoded encryption key in Siemens SIMATIC WinCC before 7.3 lets remote attackers decrypt network traffic on TCP port 1030.

Vulnerability

The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, contains a hardcoded encryption key that is identical across installations [1]. An attacker who extracts this key from one product installation can use it to decrypt network traffic on TCP port 1030 [1].

Exploitation

An attacker needs network access to sniff traffic on TCP port 1030, but does not require authentication or physical access. The attacker must first obtain the hardcoded encryption key, which can be extracted from any other installation of the same WinCC version (before 7.3) [1]. Once the key is obtained, the attacker can passively decrypt all captured communications on that port [1].

Impact

Successful exploitation leads to disclosure of sensitive information transmitted between WinCC components over TCP port 1030 [1]. The confidentiality of the wincc system is compromised, potentially exposing project configuration data, credentials, or automation process information [1].

Mitigation

Siemens released SIMATIC WinCC version 7.3, which removes the hardcoded encryption key and implements proper key management [1]. Users should upgrade to WinCC 7.3 or later. No workaround is provided by the vendor for versions before 7.3 [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

17
  • cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:siemens:simatic_pcs7:7.1:sp3:*:*:*:*:*:*
    • cpe:2.3:a:siemens:simatic_pcs7:8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:siemens:simatic_pcs7:*:sp1:*:*:*:*:*:*range: <=8.0
  • cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*+ 12 more
    • cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*range: <=7.2
    • cpe:2.3:a:siemens:wincc:5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:siemens:wincc:5.0:sp1:*:*:*:*:*:*
    • cpe:2.3:a:siemens:wincc:6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:siemens:wincc:6.0:sp2:*:*:*:*:*:*
    • cpe:2.3:a:siemens:wincc:6.0:sp3:*:*:*:*:*:*
    • cpe:2.3:a:siemens:wincc:6.0:sp4:*:*:*:*:*:*
    • cpe:2.3:a:siemens:wincc:7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:siemens:wincc:7.0:sp1:*:*:*:*:*:*
    • cpe:2.3:a:siemens:wincc:7.0:sp2:*:*:*:*:*:*
    • cpe:2.3:a:siemens:wincc:7.0:sp3:*:*:*:*:*:*
    • cpe:2.3:a:siemens:wincc:7.1:*:*:*:*:*:*:*
    • cpe:2.3:a:siemens:wincc:7.1:sp1:*:*:*:*:*:*
  • Range: <7.3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.