Siemens SIMATIC S7-1200 CPU Family Version 4
SIMATIC S7-1200 CPU family versions before 4.2.3 are vulnerable to cross-site request forgery (CSRF) attacks through the PLC's web interface. An attacker can craft a malicious website that, when visited by an authenticated PLC user, exploits the lack of CSRF token protection to perform unauthorized actions on the PLC such as modifying configuration settings or accessing sensitive data. The vulnerability requires the user to click a malicious link while authenticated to the PLC web interface. High skill level is needed to exploit this vulnerability. Siemens recommends updating to firmware version 4.2.3 or later, and advises users to avoid visiting other websites while authenticated to the PLC interface. Network isolation and firewall controls are recommended as defense-in-depth measures.
- Network access to the PLC web interface port (HTTP/HTTPS)
- An authorized user must be actively authenticated to the PLC web interface
- The user must click on an attacker-supplied link while the authenticated session is active
- User must visit the attacker's malicious website
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9e9a2802-1694-46a3-a519-6f1bdbfa5be3