ID

VAR-201310-0035


CVE

CVE-2012-4709


TITLE

Invensys Wonderware InTouch XML External entity sensitive information disclosure vulnerability

Trust: 1.0

sources: IVD: 4c1c0272-1f08-11e6-abef-000c29c66e3d // IVD: 95ea02a2-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13371

DESCRIPTION

Invensys Wonderware InTouch HMI 2012 R2 and earlier allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. Invensys Wonderware InTouch HMI To read any file, to an Internet server HTTP Request sent or service disruption (CPU And memory consumption ) Vulnerabilities exist. Invensys Wonderware InTouch is an HMI created by Invensys Wonderware for applications that design, build, deploy, and maintain production and infrastructure operations. Invensys Wonderware InTouch is prone to an information-disclosure vulnerability. An attacker can exploit this issue to gain access to sensitive information; this may lead to further attacks. The attacker may also exploit this issue to cause denial-of-service conditions. Invensys Wonderware InTouch 2012 R2 and prior versions are vulnerable. Invensys Wonderware InTouch is an open, scalable HMI and SCADA monitoring solution from Invensys, UK. The solution creates standardized, reusable visualization applications

Trust: 2.88

sources: NVD: CVE-2012-4709 // JVNDB: JVNDB-2013-004624 // CNVD: CNVD-2013-13371 // BID: 62660 // IVD: 4c1c0272-1f08-11e6-abef-000c29c66e3d // IVD: 95ea02a2-2352-11e6-abef-000c29c66e3d // VULHUB: VHN-57990

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 4c1c0272-1f08-11e6-abef-000c29c66e3d // IVD: 95ea02a2-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13371

AFFECTED PRODUCTS

vendor:invensysmodel:wonderware intouchscope:lteversion:2012

Trust: 1.0

vendor:invensysmodel:wonderware intouch hmiscope:lteversion:2012 r2

Trust: 0.8

vendor:invensysmodel:wonderware intouchscope:eqversion:10.x

Trust: 0.6

vendor:invensysmodel:wonderware intouchscope:eqversion:2012

Trust: 0.6

vendor:wonderware intouchmodel: - scope:eqversion:*

Trust: 0.4

sources: IVD: 4c1c0272-1f08-11e6-abef-000c29c66e3d // IVD: 95ea02a2-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13371 // JVNDB: JVNDB-2013-004624 // CNNVD: CNNVD-201309-506 // NVD: CVE-2012-4709

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4709
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-4709
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2013-13371
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201309-506
value: MEDIUM

Trust: 0.6

IVD: 4c1c0272-1f08-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 95ea02a2-2352-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-57990
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-4709
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-13371
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 4c1c0272-1f08-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 95ea02a2-2352-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-57990
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 4c1c0272-1f08-11e6-abef-000c29c66e3d // IVD: 95ea02a2-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13371 // VULHUB: VHN-57990 // JVNDB: JVNDB-2013-004624 // CNNVD: CNNVD-201309-506 // NVD: CVE-2012-4709

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-57990 // JVNDB: JVNDB-2013-004624 // NVD: CVE-2012-4709

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201309-506

TYPE

Buffer overflow

Trust: 1.0

sources: IVD: 4c1c0272-1f08-11e6-abef-000c29c66e3d // IVD: 95ea02a2-2352-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201309-506

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004624

PATCH

title:Wonderware InTouch HMIurl:http://global.wonderware.com/EN/Pages/WonderwareInTouchHMI.aspx

Trust: 0.8

title:Invensys Wonderware InTouch XML External Entity Information Disclosure Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/39897

Trust: 0.6

sources: CNVD: CNVD-2013-13371 // JVNDB: JVNDB-2013-004624

EXTERNAL IDS

db:NVDid:CVE-2012-4709

Trust: 3.8

db:ICS CERTid:ICSA-13-276-01

Trust: 2.5

db:BIDid:62660

Trust: 1.6

db:CNNVDid:CNNVD-201309-506

Trust: 1.1

db:CNVDid:CNVD-2013-13371

Trust: 1.0

db:JVNDBid:JVNDB-2013-004624

Trust: 0.8

db:SECUNIAid:54923

Trust: 0.6

db:IVDid:4C1C0272-1F08-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:95EA02A2-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-57990

Trust: 0.1

sources: IVD: 4c1c0272-1f08-11e6-abef-000c29c66e3d // IVD: 95ea02a2-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13371 // VULHUB: VHN-57990 // BID: 62660 // JVNDB: JVNDB-2013-004624 // CNNVD: CNNVD-201309-506 // NVD: CVE-2012-4709

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-13-276-01

Trust: 2.5

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4709

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4709

Trust: 0.8

url:http://www.secunia.com/advisories/54923/

Trust: 0.6

url:http://iom.invensys.com/en/pdflibrary/security_bulletin_lfsec00000081.pdf

Trust: 0.6

url:http://www.securityfocus.com/bid/62660

Trust: 0.6

sources: CNVD: CNVD-2013-13371 // VULHUB: VHN-57990 // JVNDB: JVNDB-2013-004624 // CNNVD: CNNVD-201309-506 // NVD: CVE-2012-4709

CREDITS

Gleb Gritsai, Nikita Mikhalevsky, Timur Yunusov, Denis Baranov, Ilya Karpov, Vyacheslav Egoshin, Dmitry Serebryannikov, Alexey Osipov, Ivan Poliyanchuk, and Evgeny Ermakov of the Positive Technologies Research Team

Trust: 0.9

sources: BID: 62660 // CNNVD: CNNVD-201309-506

SOURCES

db:IVDid:4c1c0272-1f08-11e6-abef-000c29c66e3d
db:IVDid:95ea02a2-2352-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-13371
db:VULHUBid:VHN-57990
db:BIDid:62660
db:JVNDBid:JVNDB-2013-004624
db:CNNVDid:CNNVD-201309-506
db:NVDid:CVE-2012-4709

LAST UPDATE DATE

2025-04-11T22:55:55.623000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-13371date:2014-03-11T00:00:00
db:VULHUBid:VHN-57990date:2013-10-15T00:00:00
db:BIDid:62660date:2013-10-10T08:23:00
db:JVNDBid:JVNDB-2013-004624date:2013-10-16T00:00:00
db:CNNVDid:CNNVD-201309-506date:2013-10-14T00:00:00
db:NVDid:CVE-2012-4709date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:4c1c0272-1f08-11e6-abef-000c29c66e3ddate:2013-09-29T00:00:00
db:IVDid:95ea02a2-2352-11e6-abef-000c29c66e3ddate:2013-09-29T00:00:00
db:CNVDid:CNVD-2013-13371date:2013-09-29T00:00:00
db:VULHUBid:VHN-57990date:2013-10-13T00:00:00
db:BIDid:62660date:2013-09-20T00:00:00
db:JVNDBid:JVNDB-2013-004624date:2013-10-16T00:00:00
db:CNNVDid:CNNVD-201309-506date:2013-09-30T00:00:00
db:NVDid:CVE-2012-4709date:2013-10-13T10:20:02.927