Siemens SIMATIC S7-1500 TM MFP BIOS
Act Now9.8ICS-CERT ICSA-23-166-10Jun 13, 2023
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
Multiple vulnerabilities exist in the BIOS of the SIMATIC S7-1500 TM MFP module (firmware versions before 1.3.0). These include input validation flaws (CWE-20, CWE-125), memory corruption issues (buffer overflow CWE-787, use-after-free CWE-416), and improper access controls (CWE-276, CWE-363). The BIOS fails to properly validate incoming network requests, allowing remote code execution without authentication. The vulnerabilities are remotely exploitable with low complexity, and this module is actively used in operational technology environments.
What this means
What could happen
An unauthenticated attacker on the network could exploit multiple memory corruption and input validation flaws in the BIOS to execute arbitrary code, disabling the TM MFP module and interrupting any dependent automation or safety functions that rely on it.
Who's at risk
Water authorities and electric utilities using SIMATIC S7-1500 TM MFP modules in automation systems. This includes the TM (Terminal Modem) MFP communication module used for remote access, process monitoring, or backup control functions. Any facility with this module should prioritize this vulnerability.
How it could be exploited
An attacker on the network sends a crafted network request to the SIMATIC S7-1500 TM MFP BIOS (port and protocol not specified in advisory, but likely HTTP/HTTPS or management interface). The BIOS fails to validate input and suffers from buffer overflow and memory corruption flaws, allowing the attacker to execute code with BIOS-level privileges. This could disable or modify the module's operation.
Prerequisites
- Network access to the SIMATIC S7-1500 TM MFP module
- BIOS version earlier than 1.3.0
- No authentication required
Actively exploited (KEV)Remotely exploitableNo authentication requiredLow attack complexityBIOS-level code execution possibleHigh EPSS score (59.4%)
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (1)
ProductAffected VersionsFix Status
SIMATIC S7-1500 TM MFP - BIOS<V1.3.01.3.0
Remediation & Mitigation
0/4
Do now
0/2HOTFIXUpdate SIMATIC S7-1500 TM MFP BIOS to version 1.3.0 or later
WORKAROUNDRestrict network access to the SIMATIC S7-1500 TM MFP using firewall rules or network segmentation
Long-term hardening
0/2HARDENINGOnly build and run applications from trusted sources
HARDENINGImplement defense-in-depth network security per Siemens operational guidelines for industrial security
CVEs (72)
CVE-2016-10228CVE-2019-25013CVE-2020-1752CVE-2020-10029CVE-2020-27618CVE-2020-29562CVE-2021-3326CVE-2021-3998CVE-2021-3999CVE-2021-20269CVE-2021-27645CVE-2021-28831CVE-2021-33574CVE-2021-35942CVE-2021-38604CVE-2021-42373CVE-2021-42374CVE-2021-42375CVE-2021-42376CVE-2021-42377CVE-2021-42378CVE-2021-42379CVE-2021-42380CVE-2021-42381CVE-2021-42382CVE-2021-42383CVE-2021-42384CVE-2021-42385CVE-2021-42386CVE-2021-44879CVE-2022-1015CVE-2022-1882CVE-2022-2585CVE-2022-2588CVE-2022-2905CVE-2022-3028CVE-2022-3435CVE-2022-3586CVE-2022-4378CVE-2022-4662CVE-2022-20421CVE-2022-20422CVE-2022-21233CVE-2022-23218CVE-2022-23219CVE-2022-28391CVE-2022-30065CVE-2022-39188CVE-2022-39190CVE-2022-40307CVE-2022-41222CVE-2022-42703CVE-2023-0179CVE-2023-0394CVE-2023-1073CVE-2023-2898CVE-2023-3390CVE-2023-3610CVE-2023-3611CVE-2023-3776CVE-2023-4004CVE-2023-4015CVE-2023-4128CVE-2023-4147CVE-2023-4273CVE-2023-4527CVE-2023-4806CVE-2023-4911CVE-2023-5156CVE-2023-31248CVE-2023-35001CVE-2023-45863
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/022c9584-8eb4-414c-8dfc-5de348868bd4