Siemens SIMATIC S7-1200 and S7-1500 CPU Families (Update B)
Siemens S7-1200 and S7-1500 CPU families, along with related ET200SP controllers and SIMATIC S7-PLCSIM Advanced software, contain vulnerabilities in network traffic validation and program code integrity verification (CWE-327: Use of Broken or Risky Cryptographic Algorithm; CWE-353: Missing Support for Integrity Check). An attacker with network access to the S7 protocol port (102) can modify network traffic or inject altered user program code into the CPU without proper authentication or integrity checks. This could allow unauthorized modification of automation logic and process control. The vulnerabilities affect S7-1200 firmware versions before 4.4.0, S7-1500 firmware versions before 2.8.1, S7-1500 Software Controller before 20.8, PLCSIM Advanced before 3.0, and ET200SP controllers before version 20.8. SIMATIC Drive Controller family is not affected by these vulnerabilities.
- Network access to the PLC on port 102 (Siemens S7 protocol)
- PLC must be accessible from the attacker's network segment
- No authentication required; Access Protection feature is optional and not enabled by default
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f1da30fc-8a6e-4ebc-99c6-a9c4061601c2