Siemens SIMATIC S7-400 CPU (Update A)
SIMATIC S7-400 CPU devices fail to properly validate incoming network packets (CWE-20), allowing an unauthenticated remote attacker to cause a denial of service by crashing or hanging the PLC. The vulnerability affects all versions of the standard S7-400 and S7-400H CPU hardware. For older hardware (v4.0 and earlier), Siemens has not released a firmware patch and requires a hardware upgrade to v5.0 or newer for S7-400, or v6.0 or newer for S7-400H. For S7-400 hardware v5.0, a firmware update to v5.2 or later is available. Users unable to upgrade should implement network segmentation, VPN protection for inter-cell communication, and firewall-based access controls to reduce exposure.
- Network access to the SIMATIC S7-400 CPU port (S7 protocol, typically port 102)
- No authentication credentials required
- Device must be directly reachable from attacker's network (Internet exposure increases risk significantly)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/683d84d8-9dce-44ab-9ed9-48d954d25e70