Siemens Engineering Platforms
Siemens TIA Portal-based engineering software (STEP 7, WinCC, SIMOTION SCOUT TIA, and related components) contains a local arbitrary code execution vulnerability (CWE-20: improper input validation). An attacker with local access to an engineering workstation could execute arbitrary code by tricking a user into opening a malicious project file or attachment. The vulnerability affects multiple versions; Siemens has released patches for V17 Update 9, V19 Update 4, and SIMOTION SCOUT TIA V5.6 SP1 HF7. Many products at V18 and earlier versions have no fix planned. Siemens recommends updating to TIA Portal V20 or later where available, and implementing network segmentation to protect engineering workstations.
- Local or network-adjacent access to the engineering workstation
- User must be logged in to the affected Siemens application
- User interaction required (opening a malicious file or project)
- No special privileges or credentials required beyond normal engineering workstation access
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0280f4b2-4531-418d-bc3b-85fc477cee11