OTPulse

Siemens SIMATIC STEP 7 (TIA Portal)

Monitor4.2ICS-CERT ICSA-23-348-07Dec 12, 2023
Attack VectorLocal
Auth RequiredHigh
ComplexityLow
User InteractionRequired
Summary

SIMATIC STEP 7 (TIA Portal) versions prior to V19 contain an information disclosure vulnerability that allows a local attacker with administrator access to the engineering workstation to capture the access level password for S7-1200 and S7-1500 CPUs. The vulnerability occurs when a legitimate user enters the CPU access password during hardware configuration. Once captured, an attacker could use this password to connect directly to the CPU and modify control logic, setpoints, or safety interlocks without authorization.

What this means
What could happen
A local attacker with administrator-level access to the engineering workstation could capture the password used to set the access level protection on S7-1200 and S7-1500 CPUs, potentially allowing unauthorized modification of PLC programs or settings. This requires the attacker to observe password entry in the TIA Portal during legitimate configuration work.
Who's at risk
This vulnerability affects organizations using Siemens STEP 7 (TIA Portal) versions earlier than 19 to program and configure S7-1200 and S7-1500 CPUs. It is relevant to water and wastewater utilities, electric power systems, and any industrial facility that uses these Siemens PLCs for critical process control. The risk is greatest where engineering workstations are shared among multiple users or where physical security around the engineering environment is weak.
How it could be exploited
An attacker with local administrative access to an engineering workstation running STEP 7 TIA Portal could intercept or observe the access level password when a legitimate engineer enters it during CPU hardware configuration. Once captured, the attacker could use this password to connect to the S7-1200 or S7-1500 CPU and alter control logic, setpoints, or protections without leaving the normal audit trail.
Prerequisites
  • Local access to the engineering workstation running STEP 7 TIA Portal
  • Administrator-level privileges on the workstation
  • Ability to observe or intercept password entry during CPU hardware configuration
  • Knowledge of the target CPU's IP address or network location
Local attack only, not remotely exploitableRequires administrative workstation accessTargets sensitive configuration credentialsAffects PLC password protection mechanism
Exploitability
Low exploit probability (EPSS 0.0%)
Affected products (1)
ProductAffected VersionsFix Status
SIMATIC STEP 7 (TIA Portal)<V1919
Remediation & Mitigation
0/4
Do now
0/2
HARDENINGRestrict local administrative access to engineering workstations running TIA Portal to trusted personnel only
HARDENINGImplement physical security controls around engineering workstations to prevent unauthorized local access
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate SIMATIC STEP 7 (TIA Portal) to version 19 or later
Long-term hardening
0/1
HARDENINGIsolate engineering workstations from business networks and the internet using air-gapping or firewall rules
↑↓ Navigate · Esc Close
API: /api/v1/advisories/fd786620-ef6c-43f4-85f4-481ae643148f