{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T00:48:19.094","vulnerabilities":[{"cve":{"id":"CVE-2013-4912","sourceIdentifier":"cve@mitre.org","published":"2013-08-01T13:32:26.127","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Open redirect vulnerability in Siemens WinCC (TIA Portal) 11 and 12 before 12 SP1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks by leveraging improper configuration of SIMATIC HMI panels by the WinCC product."},{"lang":"es","value":"Vulnerabilidad de redirección en Siemens WinCC (TIA Portal) 11 y 12 anterior a 12 SP1, permite a atacantes remotos redireccionar a usuarios a sitios web arbitrarios y llevar a cabo ataques de phishing aprovechando una configuración inapropiada del panel SIMANTIC HMI del producto WinCC."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:N","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:wincc:11.0:*:*:*:*:*:*:*","matchCriteriaId":"D8575F81-50D2-4879-AA97-232257913BA0"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:wincc:11.0:sp1:*:*:*:*:*:*","matchCriteriaId":"8730C7C7-D7C7-4094-99AB-6FD06D7AAB90"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:wincc:11.0:sp2:*:*:*:*:*:*","matchCriteriaId":"F9B98FB4-A080-41DC-8B1C-DA703C8975E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:wincc:12.0:*:*:*:*:*:*:*","matchCriteriaId":"30A9D051-1796-4736-97F7-3F07917E9873"}]}]}],"references":[{"url":"http://scadastrangelove.blogspot.com/2013/08/ssa-064884-wincctia-portal-fixes.html","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/54051","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/54252","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/61535","source":"cve@mitre.org"},{"url":"http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-064884.pdf","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/86100","source":"cve@mitre.org"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-13-213-02","source":"cve@mitre.org"},{"url":"http://scadastrangelove.blogspot.com/2013/08/ssa-064884-wincctia-portal-fixes.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/54051","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/54252","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/61535","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-064884.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/86100","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-13-213-02","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}