Siemens LOGO! (Update A)
Siemens LOGO! 8 BM controllers contain two credential protection weaknesses: insufficiently protected credentials in firmware versions before 1.81.2, and lack of encryption in man-in-the-middle communication in versions before 8.3. An attacker with network access could capture credentials used to access and reprogram these controllers, potentially allowing unauthorized modification of automation logic or process parameters. The vulnerabilities are tracked as CWE-200 (Information Exposure) and CWE-300 (Channel Access Control). No known public exploits exist, but the risk is elevated due to the ease of credential interception in network environments.
- Network access to the LOGO! device (same plant network or connected subnet)
- Ability to sniff or intercept network traffic between the controller and engineering workstations or other controllers
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8ec76bc9-969d-40f0-88a5-be69d54ac945Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.