ICSA-18-345-02 Siemens SINUMERIK Controllers (Update A)
Multiple buffer overflow and memory handling vulnerabilities in Siemens SINUMERIK controller firmware allow remote code execution without authentication. The vulnerabilities exist in the service daemon listening on default ports 4842/TCP and 5900/TCP. Exploitation could allow an attacker to gain full system control of the CNC controller. Affected versions: SINUMERIK 808D v4.7 and v4.8 (prior to v4.91), SINUMERIK 828D v4.7 (prior to v4.7 SP6 HF1), SINUMERIK 840D sl v4.7 (prior to v4.7 SP6 HF5), and SINUMERIK 840D sl v4.8 (prior to v4.8 SP3).
- Network access to the SINUMERIK controller on ports 4842/TCP or 5900/TCP
- No authentication required
- Controller must be running an affected firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b9665e9a-a6f2-492a-8386-3e33086fe114Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.