A vulnerability has been identified in SIMATIC BATCH V9.1 (All versions), SIMATIC Information Server 2020 (All versions < V2020 SP2 Update 5), SIMATIC Information Server 2022 (All versions < V2022 SP1 Update 2), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC06), SIMATIC
A vulnerability has been identified in SIMATIC BATCH V9.1 (All versions), SIMATIC Information Server 2020 (All versions < V2020 SP2 Update 5), SIMATIC Information Server 2022 (All versions < V2022 SP1 Update 2), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC06), SIMATIC Process Historian 2020 (All versions < V2020 SP2 Update 5), SIMATIC Process Historian 2022 (All versions < V2022 SP1 Update 2)…
| Vendor | Product | Versions |
|---|---|---|
| Siemens | SIMATIC BATCH V9.1 | 0 |
| Siemens | SIMATIC Information Server 2020 | 0 |
| Siemens | SIMATIC Information Server 2022 | 0 |
| Siemens | SIMATIC PCS 7 V9.1 | 0 |
| Siemens | SIMATIC Process Historian 2020 | 0 |
| Siemens | SIMATIC Process Historian 2022 | 0 |
| Siemens | SIMATIC WinCC Runtime Professional V18 | 0 |
| Siemens | SIMATIC WinCC Runtime Professional V19 | 0 |
| Siemens | SIMATIC WinCC V7.4 | 0 |
| Siemens | SIMATIC WinCC V7.5 | 0 |
| Siemens | SIMATIC WinCC V8.0 | 0 |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.