
NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. Also recognize that VPN is only as secure as the connected devices.

In order to run the devices in a protected IT environment, Siemens particularly recommends to configure the environment according to Siemens’ Operational Guidelines for Industrial Security and to follow the recommendations in the product manuals. MITIGATIONĪs a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. Successful exploitation of this vulnerability could make it easier for attackers to conduct cryptographic attacks against the key material. SIMATIC ITP1000 all versions prior to v23.01.03.SIMATIC IPC547G all versions prior to R1.21.0, and.SIMATIC IPC477E all versions prior to v21.01.07,.


SIMATIC IPC427E all versions prior to v21.01.07,.SIMATIC IPC277E all versions prior to v20.01.10,.SIMATIC IPC227E all versions prior to v20.01.10,.SIMATIC Field-PG M5 all versions prior to v22.01.04,.Siemens reports that the vulnerability affects the following versions of SIMATIC Industrial PCs using a version of Infineon’s Trusted Platform Module (TPM): This updated advisory is a follow-up to the original advisory titled ICSA-18-058-01 Siemens SIMATIC Industrial PCs that was published February 27, 2018, on the NCCIC/ICS-CERT website. Vulnerability: Cryptographic Issues UPDATE INFORMATION
