Siemens Industrial Products
A Socket.IO vulnerability in multiple Siemens industrial products allows a remote attacker to send a specially crafted Socket.IO packet that triggers an uncaught exception on the server, causing the Node.js process to crash. This results in a Denial-of-Service condition affecting the availability of HMI, SCADA interfaces, and Industrial Edge applications. The vulnerability has CVSS 7.3 severity and affects SIMATIC WinCC (versions 7.4, 7.5, 8.0, and Runtime Professional versions 17, 18, 19), SIMATIC PCS neo, TIA Administrator, AI Model Deployer, Data Flow Monitoring IED UI, and LiveTwin Industrial Edge app. Siemens has released fixes for most products but has not planned fixes for WinCC V7.4 and WinCC Runtime Professional V17. For products without fixes, Siemens recommends network segmentation and access control measures.
- Network access to the Socket.IO port on the affected device (typically port 3000 or 443 depending on deployment)
- No authentication required to send the malicious packet
- Device must be running a vulnerable version of the affected product
Patching may require device reboot — plan for process interruption
/api/v1/advisories/dceaa250-74f9-480e-8c1a-e9615009ec71Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.