Is WinCC Open Architecture affected by the “shellshock” vulnerability?
This vulnerability is also called bash bug / bash door in combination with unix bash (Linux/Solaris).
The “shellshock” vulnerability arises from the fact that a user can create environment variables with specially-crafted values before calling the Bash shell. These variables can contain code, which gets executed as soon as the shell is invoked, which is a potential security issue.
An overall description of this vulnerability can be viewed here: http://en.wikipedia.org/wiki/Shellshock_(software_bug)
Since WinCC OA does NOT contain services/managers, which get environment variables from remote, setting the content itself afterwards and starting sub-processes with a bash, it is not affected by this vulnerability.
Official information/references of Siemens industry can viewed here:
Industrial-Security<o:p></o:p>
http://www.industry.siemens.com/topics/global/en/industrial-security/news-alerts/Pages/alerts.aspx<o:p></o:p>
Product-Cert<o:p></o:p>
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-860967.pdf<o:p></o:p>