CVE-2023-48363
Siemens SIMATIC WinCC vulnerability analysis and mitigation

Overview

CVE-2023-48363 is a NULL Pointer Dereference vulnerability discovered in multiple Siemens SIMATIC products. The vulnerability affects various versions of OpenPCS 7 V9.1, SIMATIC BATCH V9.1, SIMATIC PCS 7 V9.1, SIMATIC Route Control V9.1, SIMATIC WinCC Runtime Professional (V18 and V19), and SIMATIC WinCC (V7.4, V7.5, and V8.0). The vulnerability was first disclosed on February 13, 2024, and involves improper handling of unorganized RPC messages in the RPC communication protocol implementation (Siemens Advisory).

Technical details

The vulnerability is classified as a NULL Pointer Dereference (CWE-476) in the RPC (Remote Procedure Call) communication protocol implementation. It has received a CVSS v3.1 base score of 6.5 (MEDIUM) with the vector string AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, and a CVSS v4.0 base score of 7.1 (HIGH) with the vector string CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N. The vulnerability requires access from an adjacent network and has low attack complexity (CISA Advisory, Siemens Advisory).

Impact

Successful exploitation of this vulnerability could allow an attacker to cause a persistent denial-of-service condition in the RPC Server of the affected products. The impact is primarily focused on system availability, with no direct effect on confidentiality or integrity (CISA Advisory).

Mitigation and workarounds

Siemens has released multiple updates and mitigations for affected products. Key recommendations include updating to the latest versions: SIMATIC WinCC V7.5 to V7.5 SP2 Update 15, WinCC V8.0 to V8.0 Update 4, WinCC Runtime Professional V18 to V18 Update 4, V19 to V19 Update 2, and PCS 7 V9.1 to V9.1 SP2 UC05. Additionally, Siemens recommends ensuring that SIMATIC WinCC, WinCC Runtime Professional, and PCS 7 stations communicate via encrypted channels by activating the 'Encrypted Communication' feature, which completely mitigates the vulnerability (Siemens Advisory).

Additional resources


SourceThis report was generated using AI

Related Siemens SIMATIC WinCC vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-28829HIGH8.8
  • Siemens SIMATIC WinCCSiemens SIMATIC WinCC
  • cpe:2.3:a:siemens:simatic_wincc
NoYesJun 13, 2023
CVE-2023-48364HIGH7.1
  • Siemens SIMATIC WinCCSiemens SIMATIC WinCC
  • cpe:2.3:a:siemens:simatic_wincc
NoYesFeb 13, 2024
CVE-2023-48363HIGH7.1
  • Siemens SIMATIC WinCCSiemens SIMATIC WinCC
  • cpe:2.3:a:siemens:simatic_wincc
NoYesFeb 13, 2024
CVE-2023-32735HIGH7
  • Siemens SIMATIC WinCCSiemens SIMATIC WinCC
  • cpe:2.3:a:siemens:simatic_wincc
NoYesJul 09, 2024
CVE-2024-42513MEDIUM5.3
  • C#C#
  • OPCFoundation.NetStandard.Opc.Ua
NoYesFeb 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management