Siemens Engineering Platforms
A local arbitrary code execution vulnerability exists in Siemens engineering and automation products (SIMATIC S7-PLCSIM, STEP 7, WinCC, SIMOTION SCOUT TIA, SINAMICS Startdrive, SIRIUS products, and TIA Portal Cloud). The vulnerability could allow an authenticated local attacker to execute arbitrary code with operating system privileges. Siemens has released fixes for STEP 7 V17/V19, WinCC Unified V17/V19, WinCC V17/V19, and SIMOTION SCOUT TIA V5.6 SP1. Many products remain unfixed, including all versions of SIMATIC S7-PLCSIM V17/V18, STEP 7 V18, WinCC V18, SIMOCODE ES, SINAMICS Startdrive, and SIRIUS products across all versions. TIA Portal V20 is not affected.
- Local access to the engineering workstation running affected Siemens software
- Low privilege user account on the workstation
- User interaction required (e.g., opening a specially crafted file)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0280f4b2-4531-418d-bc3b-85fc477cee11Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.