Siemens LOGO! 8 BM
Multiple weaknesses in LOGO! 8 BM and LOGO! Soft Comfort allow unauthenticated remote attackers to execute arbitrary code on affected devices and software. The vulnerabilities stem from improper cryptographic key management (CWE-321), weak encryption practices (CWE-327), insufficient access controls (CWE-306), and inadequate credential protection (CWE-522). An attacker can send malicious requests to port 10005/TCP to trigger code execution with full device privileges, potentially modifying program logic, disabling safety functions, or permanently corrupting firmware.
- Network access to port 10005/TCP on the affected LOGO! 8 BM device or engineering workstation running LOGO! Soft Comfort
- LOGO! 8 BM firmware version prior to v8.3 or LOGO! Soft Comfort version prior to v8.3
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a4c75cf2-e9ca-482c-b313-31bfadbd1e4aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.