Siemens SIMATIC PCS neo, TIA Administrator, and TIA Portal
Siemens SIMATIC PCS neo, TIA Administrator, SIMOCODE ES, and SIRIUS engineering tools fail to properly invalidate user sessions upon logout. An attacker who obtains a valid session token can reuse it to maintain authenticated access to the engineering environment even after the legitimate user logs out. This affects PCS neo V4.0 (all versions, no fix planned), V4.1 (before Update 2), and V5.0 (before Update 1); SIMOCODE ES V19 (before Update 1); SIRIUS Safety ES and Soft Starter ES V19 (both before Update 1); and TIA Administrator (before v3.0.4). Siemens recommends updating to patched versions and implementing network segmentation. For V4.0 with no patch available, users should enforce complete browser and application closure after logout.
- Session token obtained through phishing, eavesdropping, or similar means
- Network access to the affected product (SIMATIC PCS neo, TIA Administrator, or SIRIUS tools)
- Knowledge that the legitimate user has logged out (token reuse window)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cc603eb3-16c8-4eb5-a28b-471bbeb8e9ac