7.8
CWE
284
Advisory Published
Updated

CVE-2021-42029

First published: Tue Apr 12 2022(Updated: )

A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) V15 (All versions), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 5), SIMATIC STEP 7 (TIA Portal) V17 (All versions < V17 Update 2). An attacker could achieve privilege escalation on the web server of certain devices due to improper access control vulnerability in the engineering system software. The attacker needs to have direct access to the impacted web server.

Credit: productcert@siemens.com

Affected SoftwareAffected VersionHow to fix
SIMATIC STEP 7>=15<16
SIMATIC STEP 7=16
SIMATIC STEP 7=16-update1
SIMATIC STEP 7=16-update2
SIMATIC STEP 7=16-update3
SIMATIC STEP 7=16-update4
SIMATIC STEP 7=17
SIMATIC STEP 7=17-update1
Siemens SIMATIC S7-1200 CPU
Siemens Simatic S7-1200 CPU 1211C Firmware
Siemens SIMATIC S7-1200 CPU 1212C Firmware
Siemens S7-1200 CPU 1212FC
Siemens SIMATIC S7-1200 CPU 1214FC DC/DC/Rly
Siemens SIMATIC S7-1200 CPU
Siemens SIMATIC S7-1200 CPU 1214FC Firmware
Siemens SIMATIC S7-1200 CPU 1215FC DC/DC/DC
Siemens CPU 1215C
Siemens SIMATIC S7-1200 CPU 1215FC DC/DC/DC
Siemens S7-1200 CPU 1217C
Siemens S7-1500
Siemens Simatic S7-1500
Siemens Simatic S7-1500 CPU 1507S F Firmware
Siemens Simatic S7-1500
Siemens S7-1500 CPU
Siemens SIMATIC S7-1500 CPU 1510SP F-1
Siemens SIMATIC S7-1500 CPU 1510SP Firmware
Siemens SIMATIC S7-1500 CPU 1511-1 PN
Siemens SIMATIC S7-1500 CPU 1511-1
Siemens SIMATIC S7-1500 CPU 1511C-1 PN
Siemens SIMATIC S7-1500 CPU 1511C-1 PN
Siemens SIMATIC S7-1511F-1 PN CPU
Siemens SIMATIC S7-1511F-1 PN CPU
Siemens SIMATIC S7-1500 CPU 1511T-1 PN
Siemens SIMATIC S7-1500 CPU 1511TF-1 PN
Siemens Simatic S7-1500
Siemens SIMATIC S7-1500 CPU 1512C-1 PN
Siemens SIMATIC S7-1500 CPU 1512SP-1 PN
Siemens SIMATIC S7-1500 CPU 1512SPF-1 Firmware
Siemens SIMATIC S7-1513-1 PN CPU
siemens SIMATIC S7-1500 CPU 1513-1 PN firmware
Siemens SIMATIC S7-1500 CPU 1513f-1 PN
Siemens SIMATIC S7-1513F-1 PN CPU
Siemens SIMATIC S7-1500 CPU 1513R-1 Firmware
Siemens SIMATIC S7-1515-2 PN CPU
Siemens SIMATIC S7-1500 CPU 1515-2
Siemens S7-1500 CPU
Siemens SIMATIC S7-1515F-2 PN CPU
Siemens SIMATIC S7-1500 CPU 1515R-2 PN
Siemens Simatic S7-1500 CPU 1515T-2 PN
Siemens SIMATIC S7-1500 CPU 1515TF-2 PN
Siemens SIMATIC S7-1500
Siemens SIMATIC S7-1500 CPU 1516-3 DP Firmware
Siemens SIMATIC S7-1500 CPU 1516-3
Siemens SIMATIC S7-1500 CPU 1516-3 PN/DP
Siemens SIMATIC S7-1516F-3 PN/DP CPU
Siemens SIMATIC S7-1500 CPU 1516f-3 PN/DP
Siemens SIMATIC S7-1500 CPU 1516pro-2 PN
Siemens SIMATIC S7-1500 CPU 1516PRO F-2 PN
Siemens Simatic S7-1500
Siemens Simatic S7-1500
Siemens SIMATIC S7-1517-3 PN/DP CPU
Siemens SIMATIC S7-1517-3 PN/DP CPU
Siemens SIMATIC S7-1517-3 PN/DP CPU
Siemens SIMATIC S7-1500 CPU 1517-3 PN/DP
Siemens SIMATIC S7-1500 CPU 1517F-3 Firmware
Siemens SIMATIC S7-1500 CPU 1517f-3 PN/DP
Siemens SIMATIC S7-1500 CPU 1517TF-3 Firmware
Siemens S7-1500
Siemens SIMATIC S7-1500
Siemens Simatic S7-1500
Siemens SIMATIC CPU 1518-4
Siemens Simatic S7-1500 CPU 1518-4 PN/DP MFP
Siemens Simatic S7-1500 CPU 1518-4 PN/DP MFP
Siemens SIMATIC S7-1518F-4 PN/DP CPU
Siemens SIMATIC S7-1500 CPU 1518F-4 PN/DP
Siemens Simatic S7-1500
Siemens Simatic S7-1500
Siemens Simatic S7-1500

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2021-42029?

    CVE-2021-42029 has been assigned a medium severity rating due to its potential for privilege escalation.

  • How do I fix CVE-2021-42029?

    To remediate CVE-2021-42029, update your SIMATIC STEP 7 (TIA Portal) to version 16 Update 5 or later, or to version 17 Update 2 or later.

  • Which versions are affected by CVE-2021-42029?

    CVE-2021-42029 affects SIMATIC STEP 7 (TIA Portal) versions 15, and versions 16 before Update 5, as well as versions 17 before Update 2.

  • What are the potential impacts of CVE-2021-42029?

    CVE-2021-42029 could allow an attacker to gain unauthorized access and perform actions at a higher privilege level on the web server of affected devices.

  • Are there any workarounds for CVE-2021-42029?

    Temporary mitigation for CVE-2021-42029 involves limiting access to the web server and implementing network segmentation controls.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203