Siemens Intel Active Management Technology of SIMATIC IPCs
Siemens SIMATIC IPCs and FieldPG M5 devices contain Intel Active Management Technology (AMT) vulnerabilities that can allow a local attacker with code execution to escalate privileges and gain firmware-level control of the system. The vulnerabilities are tracked under Intel security advisories related to AMT access control issues. An attacker exploiting these flaws could potentially bypass operating system security, modify system configuration, or persist across reboots. The vulnerabilities affect all versions below the patched BIOS versions listed for each product model.
- Local code execution capability on the device (attacker must be able to run malicious software or code on the system)
- No network access required (vulnerability is local to the device)
- Higher privileges already present or obtainable on the system
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6ff05485-68ee-4ca3-b477-2d827300c360Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.