First published: Wed Feb 09 2022(Updated: )
A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V17 (All versions <= V17 Update 4), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic PCS 7 Telecontrol Firmware | <=8.2 | |
Siemens Simatic PCS 7 Telecontrol Firmware | =9.0 | |
Siemens Simatic PCS 7 Telecontrol Firmware | =9.1 | |
Siemens WinCC | <7.4 | |
Siemens WinCC | =7.4 | |
Siemens WinCC | =7.4-sp1 | |
Siemens WinCC | =7.4-sp1_update1 | |
Siemens WinCC | =7.4-sp1_update10 | |
Siemens WinCC | =7.4-sp1_update11 | |
Siemens WinCC | =7.4-sp1_update12 | |
Siemens WinCC | =7.4-sp1_update13 | |
Siemens WinCC | =7.4-sp1_update14 | |
Siemens WinCC | =7.4-sp1_update15 | |
Siemens WinCC | =7.4-sp1_update16 | |
Siemens WinCC | =7.4-sp1_update17 | |
Siemens WinCC | =7.4-sp1_update18 | |
Siemens WinCC | =7.4-sp1_update2 | |
Siemens WinCC | =7.4-sp1_update3 | |
Siemens WinCC | =7.4-sp1_update4 | |
Siemens WinCC | =7.4-sp1_update5 | |
Siemens WinCC | =7.4-sp1_update6 | |
Siemens WinCC | =7.4-sp1_update7 | |
Siemens WinCC | =7.4-sp1_update8 | |
Siemens WinCC | =7.4-sp1_update9 | |
Siemens WinCC | =7.4-update_1 | |
Siemens WinCC | =7.5 | |
Siemens WinCC | =7.5-sp1 | |
Siemens WinCC | =7.5-sp1_update1 | |
Siemens WinCC | =7.5-sp1_update2 | |
Siemens WinCC | =7.5-sp2 | |
Siemens WinCC | =7.5-sp2_update1 | |
Siemens WinCC | =7.5-sp2_update2 | |
Siemens WinCC | =7.5-sp2_update3 | |
Siemens WinCC | =7.5-sp2_update4 | |
Siemens WinCC | =7.5-sp2_update5 | |
Siemens WinCC | =13 | |
Siemens WinCC | =13-sp1 | |
Siemens WinCC | =13-sp2 | |
Siemens WinCC | =14.0.1 | |
Siemens WinCC | =15 | |
Siemens WinCC | =15.1 | |
Siemens WinCC | =15.1-update_1 | |
Siemens WinCC | =15.1-update_2 | |
Siemens WinCC | =15.1-update_3 | |
Siemens WinCC | =15.1-update_4 | |
Siemens WinCC | =15.1-update_5 | |
Siemens WinCC | =15.1-update_6 | |
Siemens WinCC | =16 | |
Siemens WinCC | =16-update1 | |
Siemens WinCC | =16-update2 | |
Siemens WinCC | =16-update3 | |
Siemens WinCC | =16-update4 | |
Siemens WinCC | =17 | |
Siemens WinCC | =17-update1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40363 has been classified with a medium severity rating.
To mitigate CVE-2021-40363, update your Siemens SIMATIC PCS 7 or WinCC software to the recommended versions as specified by Siemens.
CVE-2021-40363 affects multiple versions of Siemens SIMATIC PCS 7, SIMATIC WinCC, including V8.2 and V9.1 for PCS 7 and various versions of WinCC.
Failing to address CVE-2021-40363 could expose your system to potential unauthorized access or manipulation.
A workaround for CVE-2021-40363 may include restricting access to affected systems, though updating to the latest software is always recommended.