Siemens SIMATIC, SINAMICS (Update C)
Multiple vulnerabilities in Siemens SIMATIC and SINAMICS products allow manipulation of project files to achieve remote code execution or denial of service. Affected products include SIMATIC PCS 7, SIMATIC PDM, SIMATIC STEP 7, and SINAMICS STARTER. The vulnerabilities exist in the software's handling of project file compilation and validation (CWE-427: Uncontrolled Search Path Element; CWE-122: Heap-based Buffer Overflow). Exploitation requires access to an engineering workstation and the ability to modify project files before they are compiled and deployed to controllers.
- Local or network access to engineering workstation running vulnerable SIMATIC software
- Ability to modify project files before they are compiled and loaded onto controllers
- Engineering workstation must be connected to or have communication path to target PLC/SCADA system
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8efb8f70-8c7a-42b3-b236-fb9928fc6276Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.