CVE-2025-23364

6.2 MEDIUM

📋 TL;DR

This vulnerability in TIA Administrator allows attackers to bypass code signing certificate validation during installations, potentially enabling arbitrary code execution. All versions before V3.0.6 are affected, impacting users who install or update software using this application.

💻 Affected Systems

Products:
  • TIA Administrator
Versions: All versions < V3.0.6
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default installations and requires the application to be used for software installations/updates.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could execute malicious code with the same privileges as the TIA Administrator process, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Attackers could install malicious software disguised as legitimate updates, leading to malware infection, persistence mechanisms, or credential harvesting.

🟢

If Mitigated

With proper network segmentation and least privilege principles, impact could be limited to the specific system running TIA Administrator.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the attacker to have access to the installation process, either through network access or by tricking users into installing malicious packages.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.0.6

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-573669.html

Restart Required: Yes

Instructions:

1. Download TIA Administrator V3.0.6 from Siemens official sources. 2. Run the installer with administrative privileges. 3. Follow on-screen installation prompts. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Disable TIA Administrator

windows

Temporarily disable TIA Administrator service if not actively needed for installations

sc stop "TIA Administrator"
sc config "TIA Administrator" start= disabled

Network Isolation

windows

Restrict network access to systems running TIA Administrator

netsh advfirewall firewall add rule name="Block TIA Admin" dir=in action=block program="C:\Program Files\Siemens\TIA Administrator\tiaadmin.exe" enable=yes

🧯 If You Can't Patch

  • Implement strict software installation policies requiring manual verification of all packages
  • Deploy application whitelisting to prevent execution of unauthorized software

🔍 How to Verify

Check if Vulnerable:

Check TIA Administrator version in Control Panel > Programs and Features or run 'tiaadmin.exe --version' from command line

Check Version:

"C:\Program Files\Siemens\TIA Administrator\tiaadmin.exe" --version

Verify Fix Applied:

Verify installed version is V3.0.6 or higher using version check command

📡 Detection & Monitoring

Log Indicators:

  • Failed certificate validation events in TIA Administrator logs
  • Unexpected installation processes running
  • Process creation from TIA Administrator with unusual command lines

Network Indicators:

  • Unusual outbound connections from TIA Administrator process
  • Downloads from untrusted sources initiated by TIA Administrator

SIEM Query:

process_name:"tiaadmin.exe" AND (event_type:"process_creation" OR event_type:"network_connection")

🔗 References

📤 Share & Export