First published: Tue Jun 13 2023(Updated: )
A vulnerability has been identified in SIMATIC NET PC Software V14 (All versions), SIMATIC NET PC Software V15 (All versions), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC (All versions < V8.0), SINAUT Software ST7sc (All versions). Before SIMATIC WinCC V8, legacy OPC services (OPC DA (Data Access), OPC HDA (Historical Data Access), and OPC AE (Alarms & Events)) were used per default. These services were designed on top of the Windows ActiveX and DCOM mechanisms and do not implement state-of-the-art security mechanisms for authentication and encryption of contents.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic Net Pc Software | =14.0 | |
Siemens Simatic Net Pc Software | =15.0 | |
SIEMENS SIMATIC PCS 7 | =8.2 | |
SIEMENS SIMATIC PCS 7 | =9.0 | |
SIEMENS SIMATIC PCS 7 | =9.1 | |
Siemens Simatic WinCC | <8.0 | |
Siemens Sinaut St7sc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28829 is a vulnerability in SIMATIC NET PC Software V14, V15, SIMATIC PCS 7 V8.2, V9.0, V9.1, SIMATIC WinCC, and SINAUT Software ST7sc.
The severity of CVE-2023-28829 is high with a severity value of 8.8.
CVE-2023-28829 affects SIMATIC NET PC Software V14 (All versions), SIMATIC NET PC Software V15 (All versions), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC (All versions < V8.0), and SINAUT Software ST7sc (All versions).
To mitigate CVE-2023-28829, users are advised to follow the recommendations provided in the vendor's security advisory.
More information about CVE-2023-28829 can be found in the Siemens ProductCERT security advisory at https://cert-portal.siemens.com/productcert/pdf/ssa-508677.pdf.