Multiple Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products
Multiple path traversal and sensitive data exposure vulnerabilities (CWE-22, CWE-532) in SIMATIC WinCC and related SIMATIC products allow authenticated users to escalate privileges and read, write, or delete critical files on affected systems. The vulnerabilities exist in a shared component (SIMATIC Communication Services - SCS) used across multiple Siemens industrial automation products. Patching one product may remediate the issue across other products sharing the same installation. Affected product lines include SIMATIC PCS 7 (versions 8.2 through 9.1), SIMATIC WinCC (versions 7.4 through 17), SIMATIC Route Control (8.2 through 9.1), SIMATIC BATCH (8.2 through 9.1), OpenPCS 7 (8.2 through 9.1), and SIMATIC NET PC Software (14 through 17). Siemens has released patches for many products but significant product versions remain unpatched.
- Valid user credentials (operator, engineer, or service account) to access the SIMATIC application
- Local or network access to the affected SIMATIC software component
- The application must be running and the shared SIMATIC Communication Services (SCS) component must be loaded
- Ability to interact with file system paths accessible through the WinCC or PCS 7 interface
Patching may require device reboot — plan for process interruption
/api/v1/advisories/73fc854a-ca4e-44e2-a996-0dc52ae2fe79