Siemens TIA Portal (Update F)
A local privilege escalation vulnerability in Siemens TIA Portal versions 14, 15 (before Update 7), 16 (before Update 6), and 17 (before Update 4) allows a user with local access to execute arbitrary code with SYSTEM privileges. The vulnerability exists in the TraceEngine component located in C:\\ProgramData\\Siemens\\Automation. An attacker with local user-level access could exploit improper file permission handling to write malicious code that executes with system-level privileges. TIA Portal v14 does not have a vendor fix available. Partial mitigations exist for some earlier versions, but full fixes require updating to the specified patched versions.
- Local access to the engineering workstation running TIA Portal
- User-level (non-administrative) account on the workstation
- Write access to files or folders below the TraceEngine folder (default: C:\ProgramData\Siemens\Automation)
- Affected version of TIA Portal installed (v14, v15 before Update 7, v16 before Update 6, or v17 before Update 4)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/946031d3-d627-4804-8005-8994782ec3e5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.