CVE-2023-32736

7.3 HIGH

📋 TL;DR

This vulnerability in Siemens industrial automation software allows attackers to execute arbitrary code through type confusion when parsing user settings. It affects multiple SIMATIC, STEP 7, WinCC, and TIA Portal products across versions 16-18. Industrial control system operators using these Siemens products are at risk.

💻 Affected Systems

Products:
  • SIMATIC S7-PLCSIM
  • SIMATIC STEP 7 Safety
  • SIMATIC STEP 7
  • SIMATIC WinCC Unified
  • SIMATIC WinCC
  • SIMOCODE ES
  • SIMOTION SCOUT TIA
  • SINAMICS Startdrive
  • SIRIUS Safety ES
  • SIRIUS Soft Starter ES
  • TIA Portal Cloud
Versions: V16 (all versions), V17 (all versions < V17 Update 8), V18 (all versions < V18 Update 5/SP5 depending on product)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Multiple Siemens industrial automation products across the TIA Portal ecosystem are affected. Cloud versions have specific patch requirements.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code, potentially disrupting industrial processes, stealing intellectual property, or causing physical damage to equipment.

🟠

Likely Case

Local privilege escalation or remote code execution within the affected engineering software, potentially leading to unauthorized access to industrial control systems.

🟢

If Mitigated

Limited impact if systems are air-gapped, have strict access controls, and follow industrial security best practices.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction or local access to trigger the type confusion vulnerability through malformed user settings.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V17 Update 8, V18 Update 5/SP5, V16 requires migration to newer versions

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-871035.html

Restart Required: Yes

Instructions:

1. Download appropriate updates from Siemens Industry Online Support. 2. Install updates according to Siemens documentation. 3. Restart affected systems. 4. For V16, migrate to V17 Update 8 or V18 Update 5/SP5.

🔧 Temporary Workarounds

Restrict User Access

windows

Limit access to engineering workstations and TIA Portal installations to authorized personnel only.

Network Segmentation

all

Isolate engineering workstations and PLC programming stations from general corporate networks and internet access.

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for all engineering workstations
  • Monitor for unusual process creation or network activity from TIA Portal installations

🔍 How to Verify

Check if Vulnerable:

Check installed Siemens software versions against affected versions list in the advisory

Check Version:

Check via Siemens TIA Portal 'Help > About' or Windows Programs and Features

Verify Fix Applied:

Verify installed version is V17 Update 8 or higher, or V18 Update 5/SP5 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from TIA Portal executables
  • Access violations or crashes in Siemens software

Network Indicators:

  • Unexpected network connections from engineering workstations
  • Traffic to/from TIA Portal services on unusual ports

SIEM Query:

Process creation where parent process contains 'TIA' or 'STEP7' AND process name is unusual executable

🔗 References

📤 Share & Export