Siemens S7-400 CPUs (Update B)
Two input validation vulnerabilities (CWE-20, CWE-347) exist in the SIMATIC S7-400 CPU family. An attacker with network access to port 102/TCP via Ethernet, PROFIBUS, or MPI can send malformed packets that cause the CPU to enter a fault state, resulting in denial of service. The vulnerabilities affect a wide range of S7-400 CPU models and firmware versions. Siemens has released firmware patches for select PN/DP and H variants, but the majority of S7-400 models (DP-only, older H versions, and PN/DP V6) have no planned fix. Siemens recommends network access restrictions, protection level configuration, and defense-in-depth strategies for devices where firmware updates are not available.
- Network access to port 102/TCP on the affected S7-400 CPU, or direct access to PROFIBUS or MPI interfaces
- No authentication required
- Device must be running a vulnerable firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b85f6ffa-4df8-4c3b-9e00-bd2c5f2313ac