The May 2019 Patch Tuesday advisories from Siemens address over a dozen vulnerabilities, including serious flaws affecting the company’s LOGO and SINAMICS Perfect Harmony products.
Siemens has published a total of nine new advisories and four of them describe vulnerabilities in LOGO and SINAMICS Perfect Harmony.
According to the German industrial giant, SINAMICS Perfect Harmony GH180 medium voltage converters are impacted by two high-severity denial-of-service (DoS) vulnerabilities that can be exploited by an attacker who has access to the network housing the targeted device. The flaws can be exploited with no privileges and without any user interaction.
In the case of LOGO products, Siemens learned from external researchers that LOGO!8 BM devices, which are designed for basic automation tasks, are affected by three critical and high-severity flaws.
The vulnerabilities can be exploited by an unauthenticated attacker with network access to TCP port 10005 to reconfigure devices, obtain and decrypt project data, and acquire unencrypted passwords.
Researchers also found that the LOGO! Soft Comfort tool, which is used to configure and program LOGO controllers, is affected by an arbitrary code execution flaw. Exploitation involves the attacker tricking a legitimate user into opening a specially crafted project file.
Learn More About ICS Flaws at SecurityWeek’s 2019 ICS Cyber Security Conference
Siemens has also informed users of critical and high-severity flaws affecting SIMATIC PCS7 and WinCC products. These security holes can allow unauthenticated code execution, arbitrary command execution, and DoS attacks.
Siemens has also revealed that some flaws found last year in the WibuKey digital rights management (DRM) solution from Wibu Systems also impact its SISHIP automation solutions. The WibuKey vulnerabilities affect the products of several industrial automation companies.
Another advisory informs customers that the latest update for SCALANCE W1750D access points patches several vulnerabilities affecting Aruba Networks software — Aruba and Siemens announced a partnership last year.
Siemens says it has found no evidence that the flaws described in these advisories have been exploited for malicious purposes.
Patches, workarounds and/or mitigations are available for each of the vulnerabilities.
Related: Siemens Patches Serious DoS Flaws in Many Industrial Products
Related: Siemens Patches Several Critical Flaws in SINUMERIK Controllers

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
Latest News
- Microsoft Puts ChatGPT to Work on Automating Cybersecurity
- Video: How to Build Resilience Against Emerging Cyber Threats
- Nigerian BEC Scammer Sentenced to Prison in US
- China’s Nuclear Energy Sector Targeted in Cyberespionage Campaign
- SecurityScorecard Guarantees Accuracy of Its Security Ratings
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- 14 Million Records Stolen in Data Breach at Latitude Financial Services
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
