Siemens SIMATIC, SIPLUS Products
A denial of service vulnerability exists in OPC UA implementations (ANSI C and C++) used across multiple Siemens SIMATIC products. An unauthenticated remote attacker can send a specially crafted certificate to trigger an integer overflow (CWE-190) in certificate validation, causing the affected service to crash. The vulnerability requires only network access to the OPC UA port; no special configuration, authentication, or user interaction is needed. Siemens has released patches for many products but states that no fixes are available for WinCC V7.4, WinCC Runtime Professional V16/V17/V18, SIMATIC Comfort/Mobile RT (all versions), SIMATIC PCS neo V4.0, SIMATIC IPC DiagMonitor (all versions), and SIMATIC NET PC Software V14.
- Network access to the OPC UA service port (typically 4840)
- OPC UA service exposed or reachable from attacker's network location
- No authentication required to send the malicious certificate
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f381dfd3-f572-467a-8721-bf62c0f95b7f