Siemens SIMOTION SCOUT, SIMOTION SCOUT TIA, and SINAMICS STARTER
SIMOTION SCOUT, SIMOTION SCOUT TIA, and SINAMICS STARTER are affected by an XXE (XML External Entity) injection vulnerability in XML file processing. An attacker could craft a malicious XML file that, when opened by a user in the affected application, allows reading of arbitrary files accessible to the application process. The vulnerability requires user interaction (opening an untrusted XML file) and cannot be exploited remotely. Siemens has released hotfixes for V5.6 and V5.7 versions; older versions (V5.4, V5.5) will not receive fixes.
- User interaction required: victim must open the malicious XML file in the vulnerable application
- Local or shared network access to the engineering workstation running the affected tool
- No special privileges or authentication needed beyond normal application use
Patching may require device reboot — plan for process interruption
/api/v1/advisories/32632d71-b809-4b08-94b0-3fa658e7e5bbGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.