Siemens SIPORT
SIPORT before version 3.4.0 contains a privilege escalation vulnerability in how it manages file and folder permissions in its installation directory. A local attacker with an unprivileged user account can modify the SIPORT service executable and gain elevated (administrative) privileges, potentially allowing unauthorized changes to system configuration or operational parameters. The vulnerability stems from excessive write permissions granted to non-administrative users on critical installation files. Siemens has released version 3.4.0 as a fix and recommends updating immediately. As an interim workaround, administrators can manually restrict write permissions on the installation directory to administrative users only.
- Local user account on the SIPORT server (unprivileged access sufficient)
- Write permissions enabled on SIPORT installation directory files and folders for non-administrative users
- Ability to restart or trigger service execution
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e3659fae-c133-430e-acbb-3996b7160f77