Siemens SIMATIC S7-1500 CPU
SIMATIC S7-1500 CPU family contains an input validation weakness in the web interface. The device fails to properly validate incoming messages on ports 80/tcp and 443/tcp. An attacker can send a specially crafted message that causes the CPU to crash and stop responding, resulting in a denial of service to the automation process. This affects firmware versions 2.0 through 2.4 (no fix available—hardware restrictions prevent upgrade path) and versions 1.8.5 and below (fixed in 2.5+). The vulnerability has a CVSS score of 7.5 (high) with a network vector requiring no authentication and low attack complexity.
- Network access to ports 80/tcp and 443/tcp of the affected SIMATIC S7-1500 CPU
- No authentication required
- Device must be running firmware version 2.0 through 2.4 (most critical gap) or versions 1.8.5 and below
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9dc8bfd0-34d4-4d11-a308-676baafcca55Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.