Siemens SIMATIC S7-400
SIMATIC S7-400 and S7-410 CPU devices contain an input validation flaw (CWE-119) that allows an attacker to send a malformed packet to port 102 and crash the device, triggering a Denial-of-Service condition. The affected devices stop responding to commands and require manual restart to restore operations. Siemens has released firmware updates for some S7-400 H V6 and S7-410 families, but many S7-400 PN/DP V7 models (including 416F-2, 416F-3, 417-4, 412-1, 412-2, 414-2, 414-3, 416-2, 416-3 DP variants, and certain SIPLUS models) will not receive patches and must be protected by network controls. The vulnerability is not currently known to be exploited in the wild, but the attack vector is straightforward and requires no credentials.
- Network access to port 102 (TCP)
- No authentication required
- SIMATIC S7-400 or S7-410 device must be running a vulnerable firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/15b4ed6c-2d97-4674-a95f-b5ad27257110