Home Siemens CVE-2024-54678
Back to Siemens

CVE-2024-54678

SIMATIC PCS neo, SIMATIC S7-PLCSIM, SIMATIC STEP 7, SIMATIC WinCC, SIMOCODE ES, SIMOTION SCOUT TIA, SINAMICS Startdrive, SIRIUS Safety ES, SIRIUS Soft Starter ES, TIA Portal Cloud, TIA Portal Test Suite

Siemens CVSS 8.2 Updated March 15, 2026

Executive Risk Summary

"A vulnerability has been identified in various Siemens products, including SIMATIC PCS neo and SIMATIC STEP 7, which could allow an authenticated local attacker to execute arbitrary code within the affected application. The vulnerability is caused by improper sanitization of Interprocess Communication input received through a Windows Named Pipe accessible to all local users."

Operational Audit Arsenal

Target Type Executable
Target Asset Unknown
Standard Path %windir%\System32
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Unknown (Executable)
$Targets = 'Unknown'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Service affected

Internal Work Notes

Apply updates to affected Siemens products to prevent arbitrary code execution vulnerability

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Siemens Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.