Siemens SIMATIC WinCC, OpenPCS
Two null pointer dereference vulnerabilities in SIMATIC software products (CWE-476) can allow an attacker to cause a persistent denial of service condition in the RPC Server. Affected products include OpenPCS 7, SIMATIC BATCH V9.1, SIMATIC PCS 7 V9.1, SIMATIC Route Control V9.1, SIMATIC WinCC Runtime Professional V18/V19, SIMATIC WinCC V7.4/V7.5/V8.0. The vulnerabilities are not remotely exploitable; an attacker must be on the same network segment as the RPC Server. No known public exploitation has been reported. Siemens has released updated versions for some affected products and recommends updating to the latest versions.
- Network access to the RPC Server port on the affected device
- Device and RPC Server must be running and accessible from the attacker's network segment
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/850cbd32-7c33-4995-ac51-98434e307f7fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.