Siemens S7-1200 and S7-200 SMART CPUs (Update B)
Siemens S7-1200 and S7-200 SMART CPUs contain a firmware defect (CWE-749) that allows an attacker with physical access to the CPU to bypass security protections and execute arbitrary code. The vulnerability affects all current versions of the S7-1200 pre-v4.x family and all S7-200 SMART models up to specific version thresholds. S7-1200 v4.x versions prior to v4.4.1 FS11 are vulnerable; older v4.x and pre-v4.x models cannot be patched. S7-200 SMART models (ST, SR, CR series) are vulnerable up to v2.5.0 (ST/SR) and v2.2.2–v2.3.0 (CR models). An attacker exploiting this could modify control logic, alter setpoints, or halt production without valid credentials.
- Physical access to the S7-1200 or S7-200 SMART CPU
- Ability to connect to debug or programming interface
- No valid PLC engineering credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/138ccd4a-2551-44c0-8ed3-29206a61f383Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.