Publication Date:
Last Update:
Current Version: V1.2
CVSS v3.1 Base Score: 7.5
Un-/Collapse All
Affected Product and Versions Remediation

All versions < V3.3
affected by all CVEs

All versions < V3.3
affected by all CVEs

All versions < V3.3
affected by all CVEs

All versions
affected by all CVEs
Currently no fix is available

All versions
affected by all CVEs
Currently no fix is available

All versions
affected by all CVEs
Currently no fix is available

All versions
affected by all CVEs
Currently no fix is available

All versions
affected by all CVEs
Currently no fix is available

All versions
affected by all CVEs
Currently no fix is available

All versions
affected by all CVEs
Currently no fix is available

All versions < V2.3
affected by all CVEs

All versions < V2.3
affected by all CVEs

All versions < V2.3
affected by all CVEs

All versions < V2.3
affected by all CVEs

All versions < V2.3
affected by all CVEs

All versions < V2.3
affected by all CVEs

All versions < V3.3
affected by all CVEs

All versions < V3.3
affected by all CVEs

All versions
affected by all CVEs
Currently no fix is available

All versions
affected by all CVEs
Currently no fix is available

All versions
affected by all CVEs
Currently no fix is available

All versions < V2.3.6
affected by all CVEs

All versions < V2.3.6
affected by all CVEs
  • Deactivate the webserver if not required, and if deactivation is supported by the product
  • Restrict access to the web interface of the affected products, if deactivation is not supported by the product

Product-specific remediations or mitigations can be found in the section Affected Products and Solution.
Please follow the General Security Recommendations.

As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity

Un-/Collapse All

This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.

CVSS v3.1 Base Score 7.5
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
CWE CWE-416: Use After Free
CVSS v3.1 Base Score 7.5
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
CWE CWE-833: Deadlock
CVSS v3.1 Base Score 7.5
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
CWE CWE-770: Allocation of Resources Without Limits or Throttling

These vulnerabilities have been discovered internally by Siemens.

https://www.siemens.com/cert/advisories
V1.0 (2023-04-11): Publication Date
V1.1 (2023-05-09): Removed SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor as they are not affected
V1.2 (2024-06-11): Added fixes for SIMATIC CP 15xxSP-1 devices