Siemens SIMATIC PCS 7, SIMATIC WinCC, SIMATIC WinCC Runtime Professional, and SIMATIC NET PC Software (Update G)
A denial-of-service vulnerability exists in SIMATIC PCS 7, SIMATIC WinCC, SIMATIC WinCC Runtime Professional, SIMATIC NET PC Software, SIMATIC Route Control, and SIMATIC BATCH. The vulnerability allows an attacker to send crafted network packets that cause affected stations to stop responding. This impacts the availability and monitoring of industrial processes. Siemens has released updates for several affected products, with fixes available for SIMATIC PCS 7 v8.2 SP1, v9.0 SP1; WinCC Runtime Professional v13 SP2 Upd2, v14 SP1 Upd5; WinCC v7.2 Upd15, v7.3 Upd16, v7.4 SP1 Upd4; SIMATIC NET PC Software v14 SP1 Update 14, v15 SP1; OpenPCS 7 v8.1 Upd5, v9.0 Upd1; and SIMATIC BATCH v8.0 SP1 Upd21, v8.1 SP1 Upd16, v8.2 Upd10. Many older product versions (PCS 7 v7.1–v8.1, WinCC v7.2–v7.3, Route Control all versions, BATCH v9.0 SP1, and others) are end-of-life or have no planned fixes. For these versions, Siemens recommends enabling encrypted communication (available in WinCC v7.3+ and PCS 7 v8.1+), implementing cell protection, using VPN, and applying defense-in-depth network segmentation strategies.
- Network access to SIMATIC stations on port(s) used by SIMATIC communication (typically S7 protocol ports 102, 443, or proprietary WinCC ports)
- No authentication credentials required
- Target must be running one of the affected SIMATIC product versions
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f7c7822c-89a4-4c45-8ae0-c0d0c2a8b32b