SSA-691715

Vulnerability from csaf_siemens - Published: 2023-04-11 00:00 - Updated: 2025-09-09 00:00
Summary
SSA-691715: Vulnerability in OPC Foundation Local Discovery Server Affecting Siemens Products

Notes

Summary
A vulnerability was identified in OPC Foundation Local Discovery Server which also affects Siemens products that could allow an attacker to escalate privileges under certain circumstances. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where fixes are not, or not yet available.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.

{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "A vulnerability was identified in OPC Foundation Local Discovery Server which also affects Siemens products that could allow an attacker to escalate privileges under certain circumstances.\n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where fixes are not, or not yet available.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "productcert@siemens.com",
      "name": "Siemens ProductCERT",
      "namespace": "https://www.siemens.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-691715: Vulnerability in OPC Foundation Local Discovery Server Affecting Siemens Products - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-691715.html"
      },
      {
        "category": "self",
        "summary": "SSA-691715: Vulnerability in OPC Foundation Local Discovery Server Affecting Siemens Products - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-691715.json"
      }
    ],
    "title": "SSA-691715: Vulnerability in OPC Foundation Local Discovery Server Affecting Siemens Products",
    "tracking": {
      "current_release_date": "2025-09-09T00:00:00Z",
      "generator": {
        "engine": {
          "name": "Siemens ProductCERT CSAF Generator",
          "version": "1"
        }
      },
      "id": "SSA-691715",
      "initial_release_date": "2023-04-11T00:00:00Z",
      "revision_history": [
        {
          "date": "2023-04-11T00:00:00Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        },
        {
          "date": "2023-06-13T00:00:00Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Added fix for SIMATIC NET PC Software V17, clarified no fix planned for SIMATIC Process Historian 2020 OPC UA Server, SIMATIC NET PC Software V14 and V15"
        },
        {
          "date": "2023-08-08T00:00:00Z",
          "legacy_version": "1.2",
          "number": "3",
          "summary": "Added fix for SIMATIC WinCC Runtime Professional"
        },
        {
          "date": "2023-11-14T00:00:00Z",
          "legacy_version": "1.3",
          "number": "4",
          "summary": "Added fix for SIMATIC Process Historian 2022 OPC UA Server"
        },
        {
          "date": "2024-04-09T00:00:00Z",
          "legacy_version": "1.4",
          "number": "5",
          "summary": "Added fix for TeleControl Server Basic V3"
        },
        {
          "date": "2024-05-14T00:00:00Z",
          "legacy_version": "1.5",
          "number": "6",
          "summary": "Added fix for SIMATIC NET PC Software V18"
        },
        {
          "date": "2024-09-10T00:00:00Z",
          "legacy_version": "1.6",
          "number": "7",
          "summary": "Added fix for SIMATIC NET PC Software V16, clarified no fix planned for OpenPCS 7 V9.1"
        },
        {
          "date": "2025-09-09T00:00:00Z",
          "legacy_version": "1.7",
          "number": "8",
          "summary": "Corrected fix version for SIMATIC NET PC Software V17"
        }
      ],
      "status": "interim",
      "version": "8"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "OpenPCS 7 V9.1",
                  "product_id": "1"
                }
              }
            ],
            "category": "product_name",
            "name": "OpenPCS 7 V9.1"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SIMATIC NET PC Software V14",
                  "product_id": "2"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC NET PC Software V14"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SIMATIC NET PC Software V15",
                  "product_id": "3"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC NET PC Software V15"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All versions \u003c V16 Update 8",
                "product": {
                  "name": "SIMATIC NET PC Software V16",
                  "product_id": "4"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC NET PC Software V16"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All versions \u003c V17 SP1 Update 1",
                "product": {
                  "name": "SIMATIC NET PC Software V17",
                  "product_id": "5"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC NET PC Software V17"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All versions \u003c V18 Update 1",
                "product": {
                  "name": "SIMATIC NET PC Software V18",
                  "product_id": "6"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC NET PC Software V18"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SIMATIC Process Historian 2020 OPC UA Server",
                  "product_id": "7"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC Process Historian 2020 OPC UA Server"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All versions \u003c V2022 SP1",
                "product": {
                  "name": "SIMATIC Process Historian 2022 OPC UA Server",
                  "product_id": "8"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC Process Historian 2022 OPC UA Server"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003c8.0",
                "product": {
                  "name": "SIMATIC WinCC",
                  "product_id": "9"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC WinCC"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All versions \u003c V18 Update 2",
                "product": {
                  "name": "SIMATIC WinCC Runtime Professional",
                  "product_id": "10"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC WinCC Runtime Professional"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All versions \u003c V18.0 SP1 Update 1",
                "product": {
                  "name": "SIMATIC WinCC Unified PC Runtime V18",
                  "product_id": "11"
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC WinCC Unified PC Runtime V18"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003c3.1.2",
                "product": {
                  "name": "TeleControl Server Basic V3",
                  "product_id": "12"
                }
              }
            ],
            "category": "product_name",
            "name": "TeleControl Server Basic V3"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-44725",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "OPC Foundation Local Discovery Server (LDS) in affected products uses a hard-coded file path to a configuration file. This allows a normal user to create a malicious file that is loaded by LDS (running as a high-privilege user).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6",
          "7",
          "8",
          "9",
          "10",
          "11",
          "12"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Update the underlying OPC Foundation Unified Architecture Local Discovery Server (UA-LDS) to [V1.04.405](https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/) or later if possible",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6",
            "7",
            "8",
            "9",
            "10",
            "11",
            "12"
          ]
        },
        {
          "category": "no_fix_planned",
          "details": "Currently no fix is planned",
          "product_ids": [
            "1",
            "2",
            "3",
            "7"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V16 Update 8 or later version",
          "product_ids": [
            "4"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109974091/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V17 SP1 Update 1 or later version",
          "product_ids": [
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109820674/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V18 Update 1 or later version",
          "product_ids": [
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109826242/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V18 Update 2 or later version",
          "product_ids": [
            "10"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V18.0 SP1 Update 1 or later version",
          "product_ids": [
            "11"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109807123/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.2 or later version",
          "product_ids": [
            "12"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109955177/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V8.0 or later version",
          "product_ids": [
            "9"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109816599/"
        },
        {
          "category": "vendor_fix",
          "details": "In the context of SIMATIC PCS neo, update to SIMATIC PCS neo V4.1 or later version",
          "product_ids": [
            "8"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6",
            "7",
            "8",
            "9",
            "10",
            "11",
            "12"
          ]
        }
      ],
      "title": "CVE-2022-44725"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…