Siemens SIMATIC Communication Processor Vulnerability (Update C)
SIMATIC CP and TIM devices contain an authentication bypass vulnerability that allows unauthenticated network users to perform administrative operations on the device. The vulnerability affects multiple Communication Processor and Ethernet module product families used in industrial control networks. Siemens has released firmware updates for CP 343-1, CP 443-1, and TIM 3V-IE/TIM 4R-IE families. Several product variants (CP 342-5, CP 443-5 Basic/Extended) have no available fix and require network-based compensating controls.
- Network access (Layer 3) to the CP or TIM device on its management port
- Device must be running an affected firmware version
- No user credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/30775b12-477d-4124-af4c-f9a4ec5fd900Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.