First published: Wed Feb 09 2022(Updated: )
A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
SIEMENS SIMATIC PCS 7 | <=8.2 | |
SIEMENS SIMATIC PCS 7 | =9.0 | |
SIEMENS SIMATIC PCS 7 | =9.1 | |
Siemens Simatic WinCC | <7.4 | |
Siemens Simatic WinCC | =7.4 | |
Siemens Simatic WinCC | =7.4-sp1 | |
Siemens Simatic WinCC | =7.4-sp1_update1 | |
Siemens Simatic WinCC | =7.4-sp1_update10 | |
Siemens Simatic WinCC | =7.4-sp1_update11 | |
Siemens Simatic WinCC | =7.4-sp1_update12 | |
Siemens Simatic WinCC | =7.4-sp1_update13 | |
Siemens Simatic WinCC | =7.4-sp1_update14 | |
Siemens Simatic WinCC | =7.4-sp1_update15 | |
Siemens Simatic WinCC | =7.4-sp1_update16 | |
Siemens Simatic WinCC | =7.4-sp1_update17 | |
Siemens Simatic WinCC | =7.4-sp1_update18 | |
Siemens Simatic WinCC | =7.4-sp1_update2 | |
Siemens Simatic WinCC | =7.4-sp1_update3 | |
Siemens Simatic WinCC | =7.4-sp1_update4 | |
Siemens Simatic WinCC | =7.4-sp1_update5 | |
Siemens Simatic WinCC | =7.4-sp1_update6 | |
Siemens Simatic WinCC | =7.4-sp1_update7 | |
Siemens Simatic WinCC | =7.4-sp1_update8 | |
Siemens Simatic WinCC | =7.4-sp1_update9 | |
Siemens Simatic WinCC | =7.5 | |
Siemens Simatic WinCC | =7.5-sp1 | |
Siemens Simatic WinCC | =7.5-sp1_update1 | |
Siemens Simatic WinCC | =7.5-sp1_update2 | |
Siemens Simatic WinCC | =7.5-sp2 | |
Siemens Simatic WinCC | =7.5-sp2_update1 | |
Siemens Simatic WinCC | =7.5-sp2_update2 | |
Siemens Simatic WinCC | =7.5-sp2_update3 | |
Siemens Simatic WinCC | =7.5-sp2_update4 | |
Siemens Simatic WinCC | =7.5-sp2_update5 | |
Siemens Simatic WinCC | =13 | |
Siemens Simatic WinCC | =13-sp1 | |
Siemens Simatic WinCC | =13-sp2 | |
Siemens Simatic WinCC | =14.0.1 | |
Siemens Simatic WinCC | =15 | |
Siemens Simatic WinCC | =15.1 | |
Siemens Simatic WinCC | =15.1-update_1 | |
Siemens Simatic WinCC | =15.1-update_2 | |
Siemens Simatic WinCC | =15.1-update_3 | |
Siemens Simatic WinCC | =15.1-update_4 | |
Siemens Simatic WinCC | =15.1-update_5 | |
Siemens Simatic WinCC | =15.1-update_6 | |
Siemens Simatic WinCC | =16 | |
Siemens Simatic WinCC | =16-update1 | |
Siemens Simatic WinCC | =16-update2 | |
Siemens Simatic WinCC | =16-update3 | |
Siemens Simatic WinCC | =16-update4 | |
Siemens Simatic WinCC | =17 | |
Siemens Simatic WinCC | =17-update1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-40360 is high with a CVSS score of 8.8.
SIMATIC PCS 7 V8.2, SIMATIC PCS 7 V9.0, and SIMATIC PCS 7 V9.1 (before V9.1 SP1) are affected by CVE-2021-40360.
SIMATIC WinCC V15 and earlier versions (before V15 SP1 Update 7), SIMATIC WinCC V16 (before Update 5), and SIMATIC WinCC V17 are affected by CVE-2021-40360.
To fix CVE-2021-40360, apply the latest security update or patch provided by Siemens.
You can find more information about CVE-2021-40360 in the Siemens ProductCERT advisory: [Link](https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf).