Siemens SRCS VPN Feature in SIMATIC CP Devices
Multiple vulnerabilities in SRCS VPN feature of Siemens SIMATIC CP communication processor devices could allow an attacker to execute arbitrary code with elevated privileges. Affected products include SIMATIC CP 1242-7, CP 1243 series, CP 1542SP, CP 1543 series, and related SIPLUS variants across versions prior to specific patched releases. The SRCS VPN feature is not enabled by default but is commonly deployed for remote engineering and maintenance access. Exploitation requires network reachability to UDP port 5243 on the CP device.
- Network access to port 5243/UDP on the CP device
- SRCS VPN feature must be enabled on the device
- The device must be reachable from the attacker's network (not isolated behind firewalls)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fcd531aa-671c-481e-9029-a5bd66d35d06Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.