Unquoted Search Path Vulnerability in Windows-based Industrial Software Applications
A local privilege escalation vulnerability in multiple Siemens industrial automation products allows a user-level attacker to execute arbitrary code with SYSTEM privileges by exploiting unquoted search paths in Windows application startup. An attacker with a user account on an engineering workstation can place a malicious executable in a directory within the application's library search path. When the vulnerable Siemens application launches, Windows locates and executes the attacker's file instead of the legitimate library, granting the attacker full system control. This vulnerability affects STEP 7 (TIA Portal) across versions 13–16, SIMATIC WinCC visualization software, SINAMICS drive engineering tools, SINUMERIK CNC software, and numerous other industrial engineering applications.
- Local user account on the Windows engineering workstation where Siemens software is installed
- Write access to a directory in the application's search path (typically Program Files or a subdirectory)
- The vulnerable Siemens application must be launched by a user or service running with higher privileges
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d70df602-a980-46c6-981f-74d84a17b9ee