Publication Date:
Last Update:
Current Version: V1.3
CVSS v3.1 Base Score: 7.1
Affected Product and Versions Remediation

CAPE 14 installations installed from material dated earlier than 2021-10-05
CAPE 14 installations installed from material dated 2021-10-05 or later are not affected, as they contain a fixed version of CodeMeter Runtime.
If CAPE 14 was initially installed using earlier material, install WIBU Systems CodeMeter Runtime V7.30a manually to fix the issue: Download the package from https://www.psscape.com/codemeter and install it the same way as documented for previous versions in the PSS CAPE 14 Installation Manual. Contact PSS(R)CAPE Support at psscape.support.energy@siemens.com if you need assistance with patching affected systems.

All versions < V34.9.1
Update to V34.9.1 or later version
Alternatively, install WIBU Systems CodeMeter Runtime V7.30a manually to fix the issue: Download the package from https://www.wibu.com/us/support/user/downloads-user-software.html and follow the installation instructions from WIBU Systems. Contact PSS(R) Support via the Customer Support Portal: https://siemens-pss.freshdesk.com/en/support/login, if you need assistance with patching affected systems.

All versions < V35.3.2
Update to V35.3.2 or later version
Alternatively, install WIBU Systems CodeMeter Runtime V7.30a manually to fix the issue: Download the package from https://www.wibu.com/us/support/user/downloads-user-software.html and follow the installation instructions from WIBU Systems. Contact PSS(R) Support via the Customer Support Portal: https://siemens-pss.freshdesk.com/en/support/login, if you need assistance with patching affected systems.

All versions < V12.2.6.1
Update to V12.2.6.1 or later version
Alternatively, install WIBU Systems CodeMeter Runtime V7.30a manually to fix the issue: Download the package from https://www.wibu.com/us/support/user/downloads-user-software.html and follow the installation instructions from WIBU Systems. Contact PSS(R) Support via the Customer Support Portal: https://siemens-pss.freshdesk.com/en/support/login, if you need assistance with patching affected systems.

All versions
Update SICAM 230 to V8.00 or later version. Then update CodeMeter Runtime to V7.30a: Download the package from: https://www.wibu.com/us/support/user/downloads-user-software.html. Install it on SICAM 230 systems according to the procedure documented in chapter 9.2 of the COPA-DATA Security Vulnerability Announcement 2021_2: https://www.copadata.com/fileadmin/user_upload/faq/files/CD_SVA_2021_2.pdf.

All versions >= 2019 SP1 and < 2020 Update 2
Update to 2020 Update 2 or later version
To update, use the Information Server version as bundled with PCS neo V3.1 Upd1 (https://support.industry.siemens.com/cs/ww/en/view/109804750/) or with PCS 7 V9.1 SP1 (https://support.industry.siemens.com/cs/ww/en/view/109805073/)

Harden the application server to prevent local access by untrusted personnel.

All versions < V3.1 Upd1
Update to V3.1 Upd 1 or later version

Harden the application server to prevent local access by untrusted personnel.

All versions >= 2019 and < 2020 Update 2
Update to 2020 Update 2 or later version
To update, use the Process Historian version as bundled with PCS neo V3.1 Upd1 (https://support.industry.siemens.com/cs/ww/en/view/109804750/) or with PCS 7 V9.1 SP1 (https://support.industry.siemens.com/cs/ww/en/view/109805073/)

Harden the application server to prevent local access by untrusted personnel.

All versions < V3.17 P015
Update to V3.17 P015 or later version

Limit local access to the WinCC OA server by hardening measures according to the security guideline.

All versions < V3.18 P005
Update to V3.18 P005 or later version

Limit local access to the WinCC OA server by hardening measures according to the security guideline.

All versions >= V10.0 < V11.0

As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.

Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity

The vulnerability classification has been performed by using the CVSS scoring system in version 3.1 (CVSS v3.1) (https://www.first.org/cvss/). The CVSS environmental score is specific to the customer’s environment and will impact the overall CVSS score. The environmental score should therefore be individually defined by the customer to accomplish final scoring.

An additional classification has been performed using the CWE classification, a community-developed list of common software security weaknesses. This serves as a common language and as a baseline for weakness identification, mitigation, and prevention efforts. A detailed list of CWE classes can be found at: https://cwe.mitre.org/.

CVSS v3.1 Base Score 7.1
CVSS Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C
CWE CWE-269: Improper Privilege Management

For more details regarding the vulnerability in CodeMeter Runtime refer to:

https://www.siemens.com/cert/advisories

V1.0 (2021-11-09): Publication Date
V1.1 (2021-12-14): Added solution for SIMATIC WinCC OA V3.18 and V3.17
V1.2 (2022-01-11): Added solution for SIMATIC PCS neo, Information Server and Process Historian
V1.3 (2022-08-09): Added fix for SIMIT Simulation Platform