Siemens LOGO!8 Devices
Siemens LOGO!8 small PLCs (models 6ED1052-xyyxx-0BA8 and 6ED1052-xyy08-0BA0) contain a buffer overflow or buffer over-read vulnerability (CWE-119, CWE-384) in message handling. An unauthenticated attacker on the network can send a specially crafted packet to cause the device to crash, resulting in loss of control function. The device must be restarted to resume operation. Affected firmware versions are v1.80.xx, v1.81.xx (6ED1052-xyyxx-0BA8 models FS:01–FS:06), and versions prior to v1.82.02 (6ED1052-xyy08-0BA0 FS:01). No public exploits are known, but exploitation requires network-level access and no credentials.
- Network-level access to the LOGO!8 device (e.g., connected to plant network or accessible via Internet without firewall protection)
- No authentication required; the vulnerability can be triggered by an unauthenticated attacker
- The device must be running one of the affected firmware versions
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ad9e4b20-dc5d-4817-8d6f-b415fec0814fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.