Siemens SIMATIC Process Historian
SIMATIC Process Historian contains an authentication bypass vulnerability in the configuration interface of redundant instances. An unauthenticated attacker with network access can execute administrative database operations on the PH system. The vulnerability affects versions 2013 and earlier (all versions), 2014 prior to SP3 Update 6, 2019 (all versions), and 2020 prior to Update 2. Siemens has released a patch for 2020 Update 2. For unpatched versions, Siemens recommends disabling redundancy service firewall rules or restricting them to trusted server IPs, and isolating PH systems from untrusted networks.
- Network access to SIMATIC Process Historian redundancy services ports (PH Redundancy Services, PH Wcf MessageQueue Service, SQL Mirroring ports TCP/UDP)
- Redundancy configuration enabled on the PH instance
- No network firewall rules blocking access to the vulnerable services
Patching may require device reboot — plan for process interruption
/api/v1/advisories/509a1d6c-1f96-4920-a57a-b64c86643807Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.