CVE-2025-23365

7.8 HIGH

📋 TL;DR

A privilege escalation vulnerability in TIA Administrator allows low-privileged users to trigger installations by manipulating cache files and download paths. This enables attackers to execute arbitrary code with elevated privileges. All TIA Administrator versions before V3.0.6 are affected.

💻 Affected Systems

Products:
  • TIA Administrator
Versions: All versions < V3.0.6
Operating Systems: Windows (typically used for TIA Portal environments)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged user access to TIA Administrator interface. Industrial control systems using TIA Portal may be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, enabling installation of persistent malware, data theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative control over the TIA Administrator system and potentially adjacent industrial control systems.

🟢

If Mitigated

Limited impact if proper access controls and monitoring prevent unauthorized users from accessing TIA Administrator interfaces.

🌐 Internet-Facing: LOW - This appears to be a local attack requiring access to the TIA Administrator interface.
🏢 Internal Only: HIGH - Industrial control systems often have privileged users who could exploit this vulnerability from within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires low-privileged user access. Exploitation involves manipulating cache files and download paths to trigger installations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.0.6

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-573669.html

Restart Required: Yes

Instructions:

1. Download TIA Administrator V3.0.6 from Siemens support portal. 2. Backup current configuration. 3. Install the update following Siemens installation guide. 4. Restart the system. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict User Access

windows

Limit TIA Administrator access to only trusted, necessary administrative users.

File System Permissions

windows

Set restrictive permissions on TIA Administrator cache and download directories to prevent modification by low-privileged users.

icacls "C:\Program Files\Siemens\Automation\TIA Administrator\Cache" /deny Users:(OI)(CI)F
icacls "C:\ProgramData\Siemens\TIA Administrator\Downloads" /deny Users:(OI)(CI)F

🧯 If You Can't Patch

  • Implement strict access controls to limit TIA Administrator access to essential administrative personnel only.
  • Monitor TIA Administrator logs for unusual installation activities or cache file modifications.

🔍 How to Verify

Check if Vulnerable:

Check TIA Administrator version in Help > About. If version is below V3.0.6, the system is vulnerable.

Check Version:

Check TIA Administrator GUI: Help > About, or examine installation directory properties.

Verify Fix Applied:

Verify version shows V3.0.6 or higher in Help > About. Test that low-privileged users cannot trigger installations.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected installation processes triggered by non-admin users
  • Modifications to TIA Administrator cache or download directories by low-privileged accounts
  • Failed privilege escalation attempts in Windows security logs

Network Indicators:

  • Unusual network traffic from TIA Administrator system to update servers or package repositories

SIEM Query:

EventID=4688 AND ProcessName LIKE '%TIA Administrator%' AND SubjectUserName NOT IN (admin_users_list)

🔗 References

📤 Share & Export