DLL Hijacking Vulnerability in Siemens Web Installer used by the Online Software Delivery
A DLL hijacking vulnerability in the Siemens Web Installer component affects over 100 Siemens automation products including TIA Portal, SIMATIC WinCC, SIMATIC PCS 7, and related engineering tools. The vulnerability allows arbitrary code execution during the installation phase when users download and install affected products via Online Software Delivery (OSD). An attacker can place a malicious DLL in a location where the installer searches for dependencies, causing the legitimate application to load and execute the attacker's code with the privileges of the user performing the installation. The vulnerability poses a direct risk only during setup and installation, not during runtime operation of deployed systems. However, compromising the engineering environment could allow an attacker to inject malicious logic into control programs before deployment to production PLCs and HMI systems.
- User must initiate installation of an affected Siemens product
- Attacker must have ability to place a malicious DLL in a location searched by the installer (local access, shared network folder, or compromised download path)
- No special credentials or authentication required to exploit
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fd9b91f4-13d0-4e32-85bf-25c6288f6d1f