Siemens SIMATIC, SINAMICS, SINEC, SINEMA, SINUMERIK (Update J)
This advisory addresses a local privilege escalation vulnerability present in multiple Siemens industrial automation products. An attacker with a standard user account on an affected engineering workstation or software controller can exploit the flaw to gain SYSTEM-level privileges and execute arbitrary code. The vulnerability does not require special credentials, specific product configuration, or complex technical knowledge to exploit. Affected products include SIMATIC STEP 7 (TIA Portal) versions 13–16, SIMATIC WinCC (Runtime Professional and Runtime Advanced versions 13–16, OA v3.16–v3.17, and v7.4–v7.5), SINUMERIK Operate and ONE virtual, SINAMICS Startdrive and STARTER, SIMATIC NET PC Software (v14, v16; no fix planned for v15), SIMATIC PCS neo, SIMATIC Automation Tool, SIMATIC ProSave, SIMATIC S7-1500 Software Controller, SINEC NMS, and SINEMA Server. Siemens has released patches for most products. Workarounds include removing suspicious executables and disabling the TraceConceptX service.
- Local user account on an affected Siemens engineering workstation or control system PC
- One or more affected products installed (STEP 7 TIA Portal, WinCC, SINUMERIK, SINETICS, or related tools)
- No special configuration required; flaw present in default installations
Patching may require device reboot — plan for process interruption
/api/v1/advisories/75128572-21f9-42d5-8d1a-f3616f201bd9