Siemens OPC UA
Siemens SCADA and HMI products contain two authentication bypass vulnerabilities (CWE-208, CWE-305) in OPC UA server implementations that allow unauthenticated remote attackers to access operational data. Affected products include SIMATIC Energy Manager PRO (multiple versions), SIMATIC WinCC Unified (V18, V19), SIMATIC WinCC V8.0, SIMIT V11, Industrial Edge for Machine Tools, and SIMATIC IPC DiagMonitor. The vulnerabilities enable access to sensitive operational parameters without valid credentials. Siemens has released fixes for some versions but multiple product lines have no fix planned or available, particularly older versions of Energy Manager PRO (V7.2, V7.3) and WinCC Unified V18.
- Network access to OPC UA server endpoints (typically port 4840 for unencrypted OPC UA or port 443 for HTTPS)
- OPC UA HTTPS endpoint must be enabled (default is disabled in WinCC Unified RT and IPC DiagMonitor, but enabled in other affected products)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ae99ce60-041e-48d0-94b7-c761049b5489Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.