Siemens SIMATIC S7-1200 CPU Web Vulnerabilities
Siemens SIMATIC S7-1200 CPU web interface contains cross-site scripting (XSS) and HTTP response splitting vulnerabilities (CWE-79, CWE-113). These flaws allow an attacker to inject malicious scripts or craft HTTP headers without proper validation. An attacker with network access to the web interface could execute arbitrary JavaScript in the context of legitimate users, potentially leading to session hijacking, parameter manipulation, or unauthorized commands sent to the controller. The vulnerabilities affect S7-1200 CPU firmware versions 2.X and 3.X, and no patch is currently available from Siemens.
- Network access to the S7-1200 CPU web interface (typically port 80/443)
- No authentication required to exploit web injection vulnerabilities
Patching may require device reboot — plan for process interruption
/api/v1/advisories/31d35a0a-997e-42ed-af8b-d1978015ba43Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.