Publication Date:
Last Update:
Current Version: V1.2
CVSS v3.1 Base Score: 7.5
Affected Product and Versions Remediation

All versions < V2312
affected by all CVEs
Update to V2312 or later version

All versions < V4.1
affected by all CVEs

All versions < V2.0 SP1
affected by all CVEs

All versions
affected by all CVEs
Currently no fix is available

All versions
affected by all CVEs
Currently no fix is planned

All versions
affected by all CVEs
Currently no fix is planned

All versions
affected by all CVEs
Currently no fix is available

All versions < V17 Update 7
affected by all CVEs
Update to V17 Update 7 or later version

All versions < V18 Update 3
affected by all CVEs
Update to V18 Update 3 or later version
  • CVE-2023-46281, CVE-2023-46282: Do not access links from untrusted sources
  • CVE-2023-46283, CVE-2023-46284: If only one UMC server is used, block access to port 4002/tcp e.g. with an external firewall
  • CVE-2023-46284, CVE-2023-46285: If only one RT server is used, block access to port 4004/tcp e.g. with an external firewall. If the deployment contains no RT-Servers, block the port in the local firewall.

Product-specific remediations or mitigations can be found in the section Affected Products and Solution.
Please follow the General Security Recommendations.

As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity

Un-/Collapse All

This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.

CVSS v3.1 Base Score 7.1
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C
CWE CWE-942: Permissive Cross-domain Policy with Untrusted Domains
CVSS v3.1 Base Score 7.1
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C
CWE CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSS v3.1 Base Score 7.5
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
CWE CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVSS v3.1 Base Score 7.5
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
CWE CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVSS v3.1 Base Score 7.5
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
CWE CWE-20: Improper Input Validation

https://www.siemens.com/cert/advisories

V1.0 (2023-12-12): Publication Date
V1.1 (2024-01-09): Added fix for Totally Integrated Automation Portal (TIA Portal) V17
V1.2 (2024-02-13): Added fix for Opcenter Quality as well as product and fix for SINEC NMS