Siemens OpenSSL Vulnerability in Industrial Products (Update E)
Multiple Siemens industrial products contain a vulnerability in OpenSSL that allows encrypted data to be sent unencrypted by the SSL/TLS record layer (CWE-319: Cleartext Transmission of Sensitive Information). This affects S7-1200 and S7-1500 PLCs, MindConnect edge devices, engineering software (STEP 7, WinCC), and SCADA/HMI platforms. An attacker with network access could intercept communications and obtain sensitive data that should be encrypted in transit, including production parameters, passwords, and engineering commands.
- Network access to the affected device on port 443 or other TLS-protected port
- Device must initiate an outbound or inbound SSL/TLS connection
- Device must be running vulnerable OpenSSL version in the affected firmware/software
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a9bd2ba4-8d31-44b2-a698-03b464ecfe32Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.