Siemens SIMATIC WinCC and SIMATIC WinCC Runtime Professional
A vulnerability in Siemens SIMATIC WinCC and SIMATIC WinCC Runtime Professional versions V14 (all versions before SP1), V13 (all versions before SP2), V7.4 (all versions before SP1), and V7.3 (all versions before Update 11) allows an authenticated remote attacker to cause a denial of service condition. The vulnerability stems from improper input validation (CWE-20). An attacker with administrative credentials can send specially crafted input to the application, causing it to crash or become unresponsive, disrupting SCADA visualization and operator monitoring capabilities.
- Network access to WinCC or WinCC Runtime Professional service
- High-privilege credentials (engineering workstation or administrative user account)
- Knowledge of or ability to craft malformed input to trigger the validation failure
Patching may require device reboot — plan for process interruption
/api/v1/advisories/47a919a9-0bf3-463a-b176-f144e0e8d1a1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.