Known vulnerabilities in Siemens SIMATIC PCS 7 9.1

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › Siemens › SIMATIC PCS 7 › 9.1

Known vulnerabilities in Siemens SIMATIC PCS 7 9.1

Vendor: Siemens
Website: https://www.siemens.com/
Total Security Bulletins: 9
7.5 SP2 Update 18 7.5 SP2 Update 17 9.1 SP2 UC04 9.1 SP1 9.1 7.5 SP2 Update 5 9.0 SP3 7.4 SP1 Update 11 6.1 9.0 8.2 8.0 SP2 8.0 SP1 7.1 SP4 7.1 SP3 7.1 SP2 7.1 SP1 8.1 8.0 7.1 -

Security bulletins (9)

Secuity bulletin Severity Status Published
SB2024091119: Execution with unnecessary privileges in Siemens SIMATIC SCADA and PCS 7 systems Low
Patched
11.09.2024
SB2024071240: Information disclosure in Siemens SIMATIC WinCC Medium
Patched
12.07.2024
SB2024041145: Denial of service in Siemens SIMATIC WinCC Low
Patched
11.04.2024
SB2024022016: Multiple vulnerabilities in Siemens SIMATIC WinCC Low
Patched
20.02.2024
SB2023061441: Use of Obsolete Function in Siemens SIMATIC WinCC, SIMATIC NET PC, SIMATIC PCS and SINAUT Software ST7sc Low
Patched
14.06.2023
SB2022051718: Missing initialization of resource in Siemens SIMATIC WinCC Low
Patched
17.05.2022
SB2022021107: Information disclosure in Siemens SIMATIC WinCC and SIMATIC PCS 7 Low
Patched
11.02.2022
SB2022021106: File and Directory Information Exposure in Siemens SIMATIC WinCC and SIMATIC PCS 7 Low
Patched
11.02.2022
SB2021111815: Multiple vulnerabilities in Siemens SIMATIC WinCC and SIMATIC PCS Medium
Patched
18.11.2021

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or