Siemens SIMATIC S7-PLCSIM
Multiple Siemens engineering tools (SIMATIC STEP 7, SIMATIC WinCC, SIMATIC S7-PLCSIM, SIMOTION SCOUT TIA, SINAMICS Startdrive, SIRIUS Safety ES, SIRIUS Soft Starter ES, and TIA Portal Cloud) do not properly sanitize user input when parsing project files. This CWE-502 (type confusion) vulnerability could allow arbitrary code execution within the affected application when a malicious project file is opened. The vulnerability is local to the engineering workstation and requires user interaction to exploit.
- Access to an engineering workstation running an affected Siemens tool (STEP 7, WinCC, SIMATIC S7-PLCSIM, SIMOTION SCOUT TIA, SINAMICS Startdrive, SIRIUS Safety ES, or SIRIUS Soft Starter ES)
- User interaction required: an engineer or technician must open a malicious project file
- No authentication required beyond normal access to the workstation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/179cdf67-1823-46a9-8f32-36e1b2d1d2ebGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.