First published: Tue Apr 09 2024(Updated: )
A vulnerability has been identified in SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC04), SIMATIC WinCC Runtime Professional V17 (All versions < V17 Update 8), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 1), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 16), SIMATIC WinCC V8.0 (All versions < V8.0 Update 5). The affected products do not properly validate the input provided in the login dialog box. An attacker could leverage this vulnerability to cause a persistent denial of service condition.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC PCS 7 | <V9.1 SP2 UC04 | |
Siemens SIMATIC WinCC Runtime Professional | <V17 Update 8 | |
Siemens SIMATIC WinCC Runtime Professional | <V18 Update 4 | |
Siemens SIMATIC WinCC Runtime Professional | <V19 Update 1 | |
Siemens Simatic WinCC | <V7.5 SP2 Update 16 | |
Siemens Simatic WinCC | <V8.0 Update 5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50821 has been classified with a medium severity level due to its potential impact on industrial control systems.
To address CVE-2023-50821, upgrade to supported versions of the affected software as specified in the security advisory.
CVE-2023-50821 affects all versions of SIMATIC PCS 7 prior to V9.1 SP2 UC04 and several versions of SIMATIC WinCC Runtime Professional.
CVE-2023-50821 impacts Siemens SIMATIC PCS 7 and various versions of SIMATIC WinCC Runtime Professional.
No specific workaround is recommended for CVE-2023-50821, so it is best to upgrade the software to mitigate the vulnerability.