Which Microsoft Patches ("Security Patches" and "Critical Patches") have been tested for compatibility with SIMATIC WinCC?
These updates/patches are usually issued every second Tuesday in the month, on so-called "Patch Tuesday". Microsoft divides up the updates into numerous different classifications:
However, you only have to install "Security Patches" and "Critical Patches" to ensure that SIMATIC WinCC operation is secure and stable. For this reason, a WinCC test configuration has been set up in order to test the compatibility of the WinCC software with the above-mentioned patch classifications ("Security Patches" and "Critical Patches"). This system always features the very latest of the released versions of WinCC and Microsoft products released for operating these versions of WinCC. Compatibility tests with the latest released versions of WinCC are performed on the test system in pace with the updates published by Microsoft.
We recommend installing all the available updates of both the named classifications to ensure that the system is protected.
Through any additional software installed on your system, it might happen that you have more updates installed than checked by our tests. Of course, nothing can be said about the compatibility of these additional updates. Therefore, we recommend installing all the updates in the separate project-specific test environment prior to rolling out the updates in the productive environment.
In rare cases an update might have a negative effect on our software in our tests. This is noted in the following list in the "Test Result" field. Furthermore, we inform you as fast as possible by newsletter of any indications and the resulting remedies.
Excel file updates with negative influence
security_patches_failed.xls (12.4 KB)
Important note on the SQL Server 2014 SP2 (KB3171021)
It is not recommended to install the Service Pack with WinCC version V7.4.
Compatibility is planned for future versions.
Recommended procedure for patch management with the Microsoft Windows Server Update Service (WSUS)
These instructions assume that you have a WSUS installed for your WinCC plant. How to proceed with the WSUS is described in Entry ID: 38621083.
In the "Products and Classifications" dialog you select the "Products" tab and then all the Microsoft products relevant for the plant.
In the "Products and Classifications" dialog you select the "Classifications" tab and then "Definition Updates", "Security Updates" and "Critical Updates".
Create the project-specific groups for distribution of the updates in the plant.
Select all the available updates in the "Critical Updates" and "Security Updates" categories and then deselect the non-released patches as in the list above. Release the patches for installation in the groups created.
|5||Log in on the clients connected to the WSUS using an administrative account (the clients were configured to receive the updates from the WSUS).|
|6||Execute the updates offered.|
You can find more precise information about Industrial Security in connection with WinCC software in the WinCC Security Concept in Entry ID: 60119725.
For more detailed explanations about Microsoft Updates and the WSUS visit the following Microsoft sites.
- Microsoft Security Bulletins Deutsch
- Microsoft Security Bulletins English
- Microsoft WSUS
- To find out which Microsoft Patches are installed on the PC, refer to Entry ID: 48844294.
- These guidelines apply only for WinCC V6.0 SP4 and higher.
The procedure described above does not apply for new Microsoft Service Packs which still require an explicit release for use. If the patches require a higher version of the Microsoft software, then refer to the "WinCC Install Notes" or Entry ID 64847781, to check whether these higher versions of the software or Service Packs are released for SIMATIC WinCC.
Windows Update Service, Security Patch
Siemens provides products and solutions with industrial security functions that support the secure operation of plants, systems, machines and networks. In order to protect plants, systems, machines and networks against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept. Siemens’ products and solutions only form one element of such a concept. Customers are responsible to prevent unauthorized access to their plants, systems, machines and networks. Systems, machines and components should only be connected to the enterprise network or the internet if and to the extent necessary and with appropriate security measures (e.g. use of firewalls and network segmentation) in place. Additionally, Siemens’ guidance on appropriate security measures should be taken into account. For more information about industrial security, please visit http://www.siemens.com/industrialsecurity.
Siemens’ products and solutions undergo continuous development to make them more secure. Siemens strongly recommends to apply product updates as soon as available and to always use the latest product versions. Use of product versions that are no longer supported, and failure to apply latest updates may increase the customer’s exposure to cyber threats. To stay informed about product updates, subscribe to the Siemens Industrial Security RSS Feed under http://www.siemens.com/industrialsecurity.