Several Siemens products have vulnerabilities, which could pose a security concern. The vulnerabilities could result in illegal access, data tampering, and operational problems.
The following are some list of Siemens products & versions are affected:
- Siemens S7-PCT: All versions
- Siemens Security Configuration Tool (SCT): All versions
- Siemens SIMATIC Automation Tool: All versions
- Siemens SIMATIC BATCH V9.1: Versions prior to V9.1.2.5
- Siemens SIMATIC NET PC Software: All versions
- Siemens SIMATIC PCS 7 V9.1: All versions
- Siemens SIMATIC PDM V9.2: Versions prior to V9.2 SP2 Upd3
- Siemens SIMATIC Route Control V9.1: Versions prior to V9.1.2.5
- Siemens SIMATIC STEP 7 V5: All versions
- Siemens SIMATIC WinCC OA V3.17: All versions
- Siemens SIMATIC WinCC OA V3.18: Versions prior to V3.18 P025
- Siemens SIMATIC WinCC OA V3.19: Versions prior to V3.19 P010
- Siemens SIMATIC WinCC Runtime Advanced: All versions
- Siemens SIMATIC WinCC Runtime Professional V16: All versions
- Siemens SIMATIC WinCC Runtime Professional V17: All versions
- Siemens SIMATIC WinCC Runtime Professional V18: All versions
- Siemens SIMATIC WinCC Runtime Professional V19: All versions
- Siemens SIMATIC WinCC Unified PC Runtime: All versions
- Siemens SIMATIC WinCC V7.4: All versions
- Siemens SIMATIC WinCC V7.5: All versions
- Siemens SIMATIC WinCC V8.0: All versions
- Siemens SINAMICS Startdrive: Versions prior to V19 SP1
- Siemens SINUMERIK ONE virtual: Versions prior to V6.23
- Siemens SINUMERIK PLC Programming Tool: All versions
- Siemens TIA Portal Cloud Connector: Versions prior to V2.0
- Siemens Totally Integrated Automation Portal (TIA Portal) V15.1: All versions
- Siemens Totally Integrated Automation Portal (TIA Portal) V16: All versions
- Siemens Totally Integrated Automation Portal (TIA Portal) V17: All versions
- Siemens Totally Integrated Automation Portal (TIA Portal) V18: All versions
- Siemens Totally Integrated Automation Portal (TIA Portal) V19: Versions prior to V19 Update 2
Mitigation and Recommendation
Update Software: To remedy vulnerabilities, apply the patches & updates provided by Siemens.
Review Security Advisories: Check Siemens’ security advisories on a regular basis to stay up to date on vulnerabilities & mitigation techniques.
Implement Security Best Practices: Ensure strong security measures, such as network segmentation, access limits, and frequent security audits.
Regularly monitor systems for unexpected faults & potential security breaches.
Organizations that address these vulnerabilities promptly can considerably reduce the risk of exploitation & improve the protection of their industrial control systems.