Siemens TIA Portal
TIA Portal contains a path traversal vulnerability in project and PC system configuration file handling. If a user opens a malicious project file, an attacker could write arbitrary files to the engineering workstation, potentially achieving code execution. This affects all versions of TIA Portal V15, and unpatched versions of V16, V17, and V18. Siemens has released updates for V16, V17, and V18 but no fix is planned for V15. The vulnerability requires user interaction (opening a malicious file) and is not known to be actively exploited.
- User must open a malicious project file or PC system configuration file in TIA Portal
- The user must have write permissions to the target file locations on the engineering workstation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4360f1c4-3cda-4622-96cc-6ebc2c0413f6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.