CVE-2019-19282

Description

A vulnerability has been identified in OpenPCS 7 V8.1 (All versions), OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd3), SIMATIC BATCH V8.1 (All versions), SIMATIC BATCH V8.2 (All versions < V8.2 Upd12), SIMATIC BATCH V9.0 (All versions < V9.0 SP1 Upd5), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Update 1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC Route Control V8.1 (All versions), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions < V9.0 Upd4), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC (TIA Portal) V15.1 (All versions < V15.1 Update 5), SIMATIC WinCC (TIA Portal) V16 (All versions < V16 Update 1), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 1). Through specially crafted messages, when encrypted communication is enabled, an attacker with network access could use the vulnerability to compromise the availability of the system by causing a Denial-of-Service condition. Successful exploitation requires no system privileges and no user interaction.

Category

7.5
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.55%
Vendor Advisory siemens.com
Affected: Siemens OpenPCS 7 V8.1
Affected: Siemens OpenPCS 7 V8.2
Affected: Siemens OpenPCS 7 V9.0
Affected: Siemens SIMATIC BATCH V8.1
Affected: Siemens SIMATIC BATCH V8.2
Affected: Siemens SIMATIC BATCH V9.0
Affected: Siemens SIMATIC NET PC Software V14
Affected: Siemens SIMATIC NET PC Software V15
Affected: Siemens SIMATIC NET PC Software V16
Affected: Siemens SIMATIC PCS 7 V8.1
Affected: Siemens SIMATIC PCS 7 V8.2
Affected: Siemens SIMATIC PCS 7 V9.0
Affected: Siemens SIMATIC Route Control V8.1
Affected: Siemens SIMATIC Route Control V8.2
Affected: Siemens SIMATIC Route Control V9.0
Affected: Siemens SIMATIC WinCC (TIA Portal) V13
Affected: Siemens SIMATIC WinCC (TIA Portal) V14
Affected: Siemens SIMATIC WinCC (TIA Portal) V15.1
Affected: Siemens SIMATIC WinCC (TIA Portal) V16
Affected: Siemens SIMATIC WinCC V7.3
Affected: Siemens SIMATIC WinCC V7.4
Affected: Siemens SIMATIC WinCC V7.5
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2019-19282?
CVE-2019-19282 has been scored as a high severity vulnerability.
How to fix CVE-2019-19282?
To fix CVE-2019-19282, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2019-19282 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2019-19282 is being actively exploited. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2019-19282?
CVE-2019-19282 affects Siemens OpenPCS 7 V8.1, Siemens OpenPCS 7 V8.2, Siemens OpenPCS 7 V9.0, Siemens SIMATIC BATCH V8.1, Siemens SIMATIC BATCH V8.2, Siemens SIMATIC BATCH V9.0, Siemens SIMATIC NET PC Software V14, Siemens SIMATIC NET PC Software V15, Siemens SIMATIC NET PC Software V16, Siemens SIMATIC PCS 7 V8.1, Siemens SIMATIC PCS 7 V8.2, Siemens SIMATIC PCS 7 V9.0, Siemens SIMATIC Route Control V8.1, Siemens SIMATIC Route Control V8.2, Siemens SIMATIC Route Control V9.0, Siemens SIMATIC WinCC (TIA Portal) V13, Siemens SIMATIC WinCC (TIA Portal) V14, Siemens SIMATIC WinCC (TIA Portal) V15.1, Siemens SIMATIC WinCC (TIA Portal) V16, Siemens SIMATIC WinCC V7.3, Siemens SIMATIC WinCC V7.4, Siemens SIMATIC WinCC V7.5.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.