Deserialization Vulnerability in Siemens Engineering Platforms before V20
Affected Siemens engineering products do not properly sanitize user-controllable input when parsing files, allowing an attacker to cause type confusion and execute arbitrary code within the affected application. The vulnerability impacts multiple product families across the TIA Portal suite, including WinCC, STEP 7, STEP 7 Safety, SIMOTION SCOUT TIA, SINAMICS Startdrive, SIRIUS Safety tools, and others. Siemens has released patches for V17 Update 9, V19 Update 4, and SIMOTION SCOUT TIA V5.6 SP1 HF7. Products based on TIA Portal V20 are not affected. Many older versions (V16, V18, and all versions of SIMOCODE ES, SINAMICS Startdrive, SIMOTION SCOUT V5.4/5.5, and SIRIUS products) have no fix planned.
- User interaction required: engineer must open the malicious file in an affected Siemens engineering application
- Access to the engineering workstation or ability to deliver a file to it
- The affected product installed and in use
Patching may require device reboot — plan for process interruption
/api/v1/advisories/da691120-66c0-4c7a-9d5a-e5cc0199b3bd