Siemens SIMATIC S7-1200 and S7-1500 CPU Families (Update A)
SIMATIC S7-1200 and S7-1500 CPU families contain a memory protection bypass vulnerability (CWE-119) that could allow an attacker to write arbitrary data and code to protected memory areas or read sensitive data. The vulnerability affects the SIMATIC Drive Controller family, SIMATIC S7-1200 CPU family, SIMATIC S7-1500 CPU family, SIMATIC ET 200SP Open Controller CPU 1515SP PC2, SIMATIC S7-1500 Software Controller, and SIMATIC S7-PLCSIM Advanced. The attack has high complexity and requires network access to the PLC. Siemens has released firmware updates for most products, though SIMATIC ET 200SP Open Controller CPU 1515SP PC (non-PC2 variant) has no fix available.
- Network access to the PLC on port 102 (S7 communication)
- S7 communication must be enabled on the target CPU
- High attack complexity suggests specific knowledge of memory layout and protection mechanisms is required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0a58f945-6e53-4fdd-946e-cfdf1fcd068bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.