Siemens SIMATIC Industrial Products (Update A)
Three vulnerabilities in Siemens SIMATIC firmware (CWE-672 improper validation, CWE-401 missing release of resources) allow unauthenticated attackers to cause denial of service conditions under certain network conditions. The vulnerabilities affect multiple SIMATIC product families including Drive Controllers, S7-1200, S7-1500, ET 200SP controllers, and TIM 1531 IRC devices. Siemens has released firmware updates for most products; however, SIMATIC ET 200SP CPU 1515SP PC and CPU 1515SP PC2 Ready4Linux (all versions) have no fix available and require network-level protection instead.
- Network access to the affected Siemens controller on ports used for Siemens communication (typically 102 for S7 protocol)
- No valid credentials required
- Device must be running a vulnerable firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f40f20f9-2388-4b38-a5a2-8ffebcca802cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.