{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T15:24:05.200","vulnerabilities":[{"cve":{"id":"CVE-2013-4911","sourceIdentifier":"cve@mitre.org","published":"2013-08-01T13:32:26.113","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site request forgery (CSRF) vulnerability in Siemens WinCC (TIA Portal) 11 and 12 before 12 SP1 allows remote attackers to hijack the authentication of unspecified victims by leveraging improper configuration of SIMATIC HMI panels by the WinCC product."},{"lang":"es","value":"Vulnerabilidad CSRF en Siemens WinCC (TIA Portal) 11 y 12 anterior a 12 SP1, permite a atacantes remotos secuestrar la autenticación de víctimas sin especificar aprovechando una configuración incorrecta de los paneles SIMATIC HMI del producto WinCC."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:wincc:11.0:*:*:*:*:*:*:*","matchCriteriaId":"D8575F81-50D2-4879-AA97-232257913BA0"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:wincc:11.0:sp1:*:*:*:*:*:*","matchCriteriaId":"8730C7C7-D7C7-4094-99AB-6FD06D7AAB90"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:wincc:11.0:sp2:*:*:*:*:*:*","matchCriteriaId":"F9B98FB4-A080-41DC-8B1C-DA703C8975E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:wincc:12.0:*:*:*:*:*:*:*","matchCriteriaId":"30A9D051-1796-4736-97F7-3F07917E9873"}]}]}],"references":[{"url":"http://scadastrangelove.blogspot.com/2013/08/ssa-064884-wincctia-portal-fixes.html","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/54051","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/54252","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/61536","source":"cve@mitre.org"},{"url":"http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-064884.pdf","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/86099","source":"cve@mitre.org"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-13-213-02","source":"cve@mitre.org"},{"url":"http://scadastrangelove.blogspot.com/2013/08/ssa-064884-wincctia-portal-fixes.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/54051","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/54252","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/61536","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-064884.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/86099","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-13-213-02","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}