Siemens Web Installer
A DLL hijacking vulnerability exists in the installers used for numerous Siemens automation products. When a user installs an affected product, the installer searches for required DLL files. An attacker with access to the local installation directory can place a malicious DLL that matches an expected filename, causing the installer to load and execute the attacker's code with the privileges of the installation process. The vulnerability is present during the setup and installation phase of affected applications downloaded via OSD (Online Software Delivery). Siemens has released patches for some products but states that no fixes are planned for many others. Siemens recommends using clean, empty directories for installation and restricting local access to installation areas.
- Local access to the installation directory before the installer runs
- User must initiate installation of an affected Siemens product from that directory
- Attacker must predict the DLL names the installer searches for
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cb4bc40c-feee-426c-bc12-a901242f886cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.