Siemens SIMATIC PCS neo, TIA Administrator, and TIA Portal
Affected Siemens products do not properly invalidate user sessions when a user logs out. This means an attacker who has obtained a valid session token through other means (phishing, network capture, credential theft) can re-use that token to access the system after the legitimate user has logged out. An attacker with a valid session token gains the same permissions as the original user, allowing them to access engineering workstations, modify control system projects, alter process setpoints, or reconfigure safety systems. The vulnerability requires the attacker to first obtain the session token but does not require any valid credentials or authentication once the token is possessed.
- Session token obtained by attacker (via phishing, credential compromise, or network interception)
- Access to the engineering workstation or TIA Portal/SIMATIC PCS neo interface from the network
- The legitimate user must have logged out but the session token has not been properly invalidated
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cc603eb3-16c8-4eb5-a28b-471bbeb8e9acGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.