March 14, 2023, midnight |

Siemens ProductCERT Security Advisories cert-portal.siemens.com

The below referenced devices contain multiple vulnerabilities that could be exploited when the SINEMA Remote Connect Server (SRCS) VPN feature is used. The feature is not activated by default. The most severe could allow an attacker to execute arbitrary code with elevated privileges under certain circumstances.


Siemens has released updates for the affected products and recommends to update to the latest versions.

code connect default devices exploited latest privileges products server siemens simatic ssa under update updates vpn vulnerabilities

More from cert-portal.siemens.com / Siemens ProductCERT Security Advisories

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Audit and Compliance Technical Analyst

@ Accenture Federal Services | Washington, DC

ICS Cyber Threat Intelligence Analyst

@ STEMBoard | Arlington, Virginia, United States

Cyber Operations Analyst

@ Peraton | Arlington, VA, United States

Cybersecurity – Information System Security Officer (ISSO)

@ Boeing | USA - Annapolis Junction, MD

Network Security Engineer I - Weekday Afternoons

@ Deepwatch | Remote