Multiple Vulnerabilities in SIMATIC eaSie
Act Now10SSA-580125Jul 12, 2022
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
SIMATIC eaSie contains multiple input validation and authentication vulnerabilities that allow an attacker to send arbitrary messages to the underlying message passing framework or crash attached applications. The vulnerability affects SIMATIC eaSie Core Package versions prior to 22.00.
What this means
What could happen
An attacker could send malicious messages to the eaSie message passing framework, potentially altering process behavior or causing application crashes that disrupt engineering workstations and system operation.
Who's at risk
Engineering and automation teams using SIMATIC eaSie for industrial automation development, configuration, and system engineering. This affects organizations running Siemens automation platforms, particularly those with eaSie deployment for PLC programming and system management.
How it could be exploited
An attacker with network access to the SIMATIC eaSie system could send crafted messages without authentication to the message passing framework, bypassing input validation checks to either inject arbitrary commands into the system's messaging layer or trigger a denial of service condition.
Prerequisites
- Network access to SIMATIC eaSie system (typically port 102 or messaging service ports)
- No authentication required
remotely exploitableno authentication requiredlow complexityCVSS 10 (critical)affects engineering systems that control physical operations
Exploitability
Low exploit probability (EPSS 0.5%)
Affected products (1)
ProductAffected VersionsFix Status
SIMATIC eaSie Core Package< V22.0022.00
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate SIMATIC eaSie Core Package to version 22.00 or later
CVEs (2)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/a916692d-2050-4924-8f1a-63030522d98e