Article No° | Product Name | Affected Version(s) |
---|---|---|
MES PC: with TIA-Portal V15 < V17 Update 6 or V18 < V18 Update 1 | = based on DELL XE3 | |
8107242 | TP260: with TIA-Portal V15 < V17 Update 6 or V18 < V18 Update 1 | < June 2023 |
A vulnerability was reported in Siemens TIA Portal. TIA Portal is part of the installation packages of several Festo Didactic products.
TP 260 before June 2023 and MES PC based on DELL XE3 contain a vulnerable versions of TIA Portal V15 to V18.
Affected products of TIA Portal contain a path traversal vulnerability that could allow the creation or overwrite of arbitrary files in the engineering system.
A vulnerability has been identified in Totally Integrated Automation Portal (TIA Portal) V15 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 6), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 1). Affected products contain a path traversal vulnerability that could allow the creation or overwrite of arbitrary files in the engineering system. If the user is tricked to open a malicious PC system configuration file, an attacker could exploit this vulnerability to achieve arbitrary code execution.
General recommendations
As part of a security strategy, Festo recommends the following general defense measures to reduce the risk of exploits:
Festo strongly recommends to minimize and protect network access to connected devices with state of the art techniques and processes.
For a secure operation follow the recommendations in the product manuals.
Remediation
Update TIA-Portal. Please refer to Siemens SSA-116924 for more details.
Festo SE & Co. KG thanks CERT@VDE for coordination and support with this publication