ICSA-19-043-06 Siemens CP1604 and CP1616 (Update A)
Siemens CP 1604 and CP 1616 communication processors contain critical vulnerabilities in the integrated web server that allow remote code execution without authentication. The issues involve cleartext transmission of sensitive data (CWE-319), cross-site scripting (CWE-79), and cross-site request forgery (CWE-352). The web server is disabled by default, but if enabled for remote management, an attacker on the network can send malicious HTTP requests or trick operators into clicking crafted links to execute code on the device. Fixes are available in version 2.8 and interim updates for versions 2.5, 2.6, and 2.7.
- Network access to the communication processor on port 80/TCP (HTTP) or port 23/TCP (telnet)
- Integrated web server must be enabled (disabled by default)
- No credentials required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/aaa24379-d5dc-44df-a6f4-650456fa8052Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.