Siemens SWT3000
The Siemens SWT3000 device (TPOP and IEC 61850 firmware versions) contains vulnerabilities related to authentication bypass and input validation (CWE-287, CWE-288, CWE-20). An attacker on the network can bypass authentication mechanisms and access the device without valid credentials, potentially reading sensitive operational data. The device does not properly validate or encrypt communications, allowing remote access with low skill level. Siemens is providing updated firmware through the Customer Support Center.
- Network access to the SWT3000 device on port(s) used by TPOP or IEC 61850 firmware
- No credentials required
- Device must be deployed and operational
Patching may require device reboot — plan for process interruption
/api/v1/advisories/83a018c1-1e77-4896-bcda-986702de9eb4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.