Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Siemens Product Updates (AL03/250211/CSIRT-ITA)

Siemens Product Updates (AL03/250211/CSIRT-ITA)

Summary

Siemens has released security updates to fix multiple vulnerabilities in its products, including 29 with a “high” severity and 4 with a “critical” severity.

Risk

Estimate of impact of the vulnerability on the reference community: High (67.91)

Type

  • Privilege Escalation
  • Remote Code Execution
  • Denial of Service

Affected products and/or versions

  • SIMATIC S7-1200 CPU family V4 (incl. SIPLUS variants)
  • Opcenter Intelligence
  • SIMATIC PCS neo
  • TIA Administrator
  • Totally Integrated Automation Portal (TIA Portal)
  • SIMATIC IPC DiagBase
  • SIMATIC IPC DiagMonitor
  • APOGEE PXC Series (BACnet)
  • APOGEE PXC Series (P2 Ethernet)
  • TALON TC Series (BACnet)
  • SCALANCE W-700 IEEE 802.11ax family
  • SIPROTEC 5 – CP050 Devices
  • SIPROTEC 5 – CP150 Devices
  • SIPROTEC 5 – CP300 Devices
  • SIPROTEC 5 Communication Modules
  • Teamcenter

Mitigation Actions

It is recommended that mitigations be implemented following the instructions provided by the vendor for each affected product and reported in the security bulletins in the References section.

The following are the CVEs for the “high” and “critical” severity vulnerabilities only:

CVE
CVE-2022-22127CVE-2023-23559CVE-2023-5717
CVE-2022-22128CVE-2023-28578CVE-2024-45386
CVE-2022-2588CVE-2023-31315CVE-2024-4741
CVE-2022-40303CVE-2023-35001CVE-2024-50572
CVE-2022-40304CVE-2023-3611CVE-2024-54015
CVE-2022-47069CVE-2023-43522CVE-2024-54089
CVE-2023-0286CVE-2023-45853CVE-2024-6119
CVE-2023-0464CVE-2023-4623CVE-2025-23363
CVE-2023-1118CVE-2023-46604CVE-2025-24499
CVE-2023-1380CVE-2023-4921CVE-2025-24811
CVE-2023-1670CVE-2023-5363CVE-2025-26491

References

https://cert-portal.siemens.com/productcert/html/ssa-769027.html

https://cert-portal.siemens.com/productcert/html/ssa-767615.html

https://cert-portal.siemens.com/productcert/html/ssa-656895.html

https://cert-portal.siemens.com/productcert/html/ssa-615116.html

https://cert-portal.siemens.com/productcert/html/ssa-369369.html

https://cert-portal.siemens.com/productcert/html/ssa-342348.html

https://cert-portal.siemens.com/productcert/html/ssa-246355.html

https://cert-portal.siemens.com/productcert/html/ssa-224824.html

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services