The May 2019 Patch Tuesday advisories from Siemens address over a dozen vulnerabilities, including serious flaws affecting the company’s LOGO and SINAMICS Perfect Harmony products.
Siemens has published a total of nine new advisories and four of them describe vulnerabilities in LOGO and SINAMICS Perfect Harmony.
According to the German industrial giant, SINAMICS Perfect Harmony GH180 medium voltage converters are impacted by two high-severity denial-of-service (DoS) vulnerabilities that can be exploited by an attacker who has access to the network housing the targeted device. The flaws can be exploited with no privileges and without any user interaction.
In the case of LOGO products, Siemens learned from external researchers that LOGO!8 BM devices, which are designed for basic automation tasks, are affected by three critical and high-severity flaws.
The vulnerabilities can be exploited by an unauthenticated attacker with network access to TCP port 10005 to reconfigure devices, obtain and decrypt project data, and acquire unencrypted passwords.
Researchers also found that the LOGO! Soft Comfort tool, which is used to configure and program LOGO controllers, is affected by an arbitrary code execution flaw. Exploitation involves the attacker tricking a legitimate user into opening a specially crafted project file.
Learn More About ICS Flaws at SecurityWeek’s 2019 ICS Cyber Security Conference
Siemens has also informed users of critical and high-severity flaws affecting SIMATIC PCS7 and WinCC products. These security holes can allow unauthenticated code execution, arbitrary command execution, and DoS attacks.
Siemens has also revealed that some flaws found last year in the WibuKey digital rights management (DRM) solution from Wibu Systems also impact its SISHIP automation solutions. The WibuKey vulnerabilities affect the products of several industrial automation companies.
Another advisory informs customers that the latest update for SCALANCE W1750D access points patches several vulnerabilities affecting Aruba Networks software — Aruba and Siemens announced a partnership last year.
Siemens says it has found no evidence that the flaws described in these advisories have been exploited for malicious purposes.
Patches, workarounds and/or mitigations are available for each of the vulnerabilities.
Related: Siemens Patches Serious DoS Flaws in Many Industrial Products
Related: Siemens Patches Several Critical Flaws in SINUMERIK Controllers

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
Latest News
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- UK Car Retailer Arnold Clark Hit by Ransomware
- Dealing With the Carcinization of Security
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023 | Regulations
