Out of Bound Read Vulnerability in TPM 2.0
An out-of-bounds read vulnerability in the Trusted Platform Module (TPM) of multiple Siemens industrial PC models could allow a local user to read memory beyond intended boundaries. This may expose sensitive information stored in or accessed by the TPM, such as encryption keys, or cause the TPM to stop functioning (denial of service). The vulnerability affects several product lines including SIMATIC IPC BX-series, PX-series, RW-series, MD-series, and SIMATIC Field PG series panels. Siemens has released firmware updates for some products but has marked others as end-of-life with no fix planned.
- Local user-level account on the industrial PC
- Ability to interact with TPM interfaces (typically available to any local user)
- Affected firmware version installed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7a9484fc-61fc-4613-a85d-698d51a6dd11Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.