ICSA-19-192-03 Siemens TIA Administrator (TIA Portal)
TIA Administrator versions prior to v1.0 SP1 Upd1 contain a privilege escalation vulnerability (CWE-306) that allows an attacker with local system access to execute arbitrary code or commands with elevated privileges. The vulnerability has a CVSS score of 8.0 (high severity) with potential for significant impact on system configuration and safety logic. No public exploits are currently known, and the vulnerability is not remotely exploitable. Siemens recommends updating to v1.0 SP1 Upd1 or later and restricting network access to port 8888/TCP.
- Local access to the TIA Administrator workstation (physical or remote desktop/SSH)
- TIA Administrator version earlier than v1.0 SP1 Upd1 installed on the target machine
- Ability to execute code or commands on the local system
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8078d9c3-d681-4b96-ad9b-78dd4af7a02bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.