Authentication Bypass Vulnerabilities in OPC UA
Two authentication bypass vulnerabilities in OPC UA implementation allow attackers to gain unauthorized access to Siemens automation servers without valid credentials. Affected products include SIMATIC Energy Manager PRO (V7.2–V7.5), SIMIT (V11), SIMATIC IPC DiagMonitor, SIMATIC WinCC Unified (V18–V19), and SIMATIC WinCC V8.0. An attacker with network access to the OPC UA service can read or modify process data and server functionality. Siemens has released fixes for V7.4 Update 7, V7.5 Update 2, SIMIT 11.3, WinCC Unified 19 Update 4, and WinCC V8.0 Update 3. For older versions of Energy Manager PRO, IPC DiagMonitor, WinCC Unified V18, and Industrial Edge for Machine Tools, no fix is currently available.
- Network access to OPC UA port (typically port 4840 or custom configured port)
- Target device running affected Siemens product version
- OPC UA interface enabled on the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/43455e1b-3dbe-45c3-b02a-26d9176f1292