Siemens SIMATIC Industrial Products
This advisory addresses Intel-SA-00688 vulnerabilities that affect Siemens SIMATIC industrial products. The vulnerabilities stem from underlying Intel BIOS issues and require local code execution with elevated privileges to exploit. Siemens has released BIOS updates (2022.3 IPU) for most affected products. A successful attack allows an attacker to modify device firmware or system settings, potentially disrupting industrial processes. The SIMATIC ITP1000 is affected across all versions with no patch available from Siemens.
- Local access to the device (not remotely exploitable)
- Ability to execute untrusted code on the device (e.g., via compromised USB, file share, or user action)
- High privilege context (administrative or engineering credentials may be required depending on system configuration)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9780d206-2ab1-4911-b161-bc5fce8d1665Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.