Siemens SIMATIC S7-PLCSIM
Siemens SIMATIC and TIA Portal products contain a vulnerability in local Windows Named Pipe access control and input validation. The affected products do not properly restrict access permissions to a local Named Pipe and do not properly sanitize user input sent to that pipe. This could allow a local authenticated attacker to cause a type confusion and execute arbitrary code within the affected application's privileges. Affected products include SIMATIC PCS neo (V4.1, V5.0, V6.0), SIMATIC S7-PLCSIM V17, SIMATIC STEP 7 (V17, V18, V19, V20), SIMATIC WinCC (V17, V18, V19, V20), SIMOTION SCOUT TIA (V5.4–V5.7), SINAMICS Startdrive (V17–V20), SIRIUS Safety/Soft Starter ES (V17–V20), SIMOCODE ES (V17–V20), TIA Portal Cloud (V17–V20), and TIA Portal Test Suite V20.
- Local user account on the Windows system running an affected product
- Ability to interact with Windows Named Pipes on that system
- The affected application must be running
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9120f1be-b283-4fe4-9277-66a756556218