Siemens SIMATIC S7-1500 TM MFP Linux Kernel
Act Now9.8ICS-CERT ICSA-23-166-11Jun 13, 2023
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
Multiple vulnerabilities exist in the GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.0. These include memory corruption (CWE-190, CWE-787, CWE-121, CWE-119, CWE-120), authentication bypass (CWE-287, CWE-284), privilege escalation (CWE-863), insecure cryptographic practices (CWE-327, CWE-326), and improper input validation (CWE-20). The vulnerabilities allow remote code execution and system compromise without authentication. Siemens has released version 1.1 which corrects these issues.
What this means
What could happen
Multiple critical vulnerabilities in the Linux subsystem of SIMATIC S7-1500 TM MFP could allow an attacker to execute arbitrary code, modify system configurations, or disrupt operations on the controller. This device is actively being exploited in the wild.
Who's at risk
Organizations operating SIMATIC S7-1500 TM MFP controllers in water distribution, wastewater treatment, electrical generation, or other critical infrastructure should prioritize this immediately. The device manages critical process logic and safety functions; compromise could disrupt operations or affect public safety.
How it could be exploited
An attacker with network access to the SIMATIC S7-1500 TM MFP can send specially crafted requests to trigger memory corruption, authentication bypass, or privilege escalation flaws in the Linux kernel subsystem. Once exploited, the attacker gains full control to modify process logic, alter setpoints, or halt the controller entirely.
Prerequisites
- Network access to the SIMATIC S7-1500 TM MFP
- No authentication required for initial exploitation
remotely exploitableno authentication requiredlow complexityactively exploited (KEV)high EPSS score (88.5%)affects critical infrastructure control systems
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (1)
ProductAffected VersionsFix Status
SIMATIC S7-1500 TM MFP - GNU/Linux subsystem<V1.11.1
Remediation & Mitigation
0/4
Do now
0/3HOTFIXUpdate SIMATIC S7-1500 TM MFP GNU/Linux subsystem to version 1.1 or later
WORKAROUNDRestrict network access to the SIMATIC S7-1500 TM MFP using firewall rules, network segmentation, or air-gapping from untrusted networks
HARDENINGOnly deploy and run applications on the device from trusted, verified sources with proper code review and validation
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HARDENINGImplement network monitoring and intrusion detection to detect suspicious connection attempts to the device
CVEs (168)
CVE-2020-12762CVE-2021-3759CVE-2021-4037CVE-2021-33655CVE-2021-44879CVE-2022-0171CVE-2022-1012CVE-2022-1015CVE-2022-1184CVE-2022-1292CVE-2022-1343CVE-2022-1434CVE-2022-1462CVE-2022-1473CVE-2022-1679CVE-2022-1852CVE-2022-1882CVE-2022-2068CVE-2022-2078CVE-2022-2097CVE-2022-2153CVE-2022-2274CVE-2022-2327CVE-2022-2503CVE-2022-2586CVE-2022-2588CVE-2022-2602CVE-2022-2663CVE-2022-2905CVE-2022-2959CVE-2022-2978CVE-2022-3028CVE-2022-3104CVE-2022-3115CVE-2022-3169CVE-2022-3303CVE-2022-3521CVE-2022-3524CVE-2022-3534CVE-2022-3545CVE-2022-3564CVE-2022-3565CVE-2022-3586CVE-2022-3594CVE-2022-3606CVE-2022-3621CVE-2022-3625CVE-2022-3628CVE-2022-3629CVE-2022-3633CVE-2022-3635CVE-2022-3646CVE-2022-3649CVE-2022-4095CVE-2022-4129CVE-2022-4139CVE-2022-4269CVE-2022-4304CVE-2022-4450CVE-2022-4662CVE-2022-20421CVE-2022-20422CVE-2022-20566CVE-2022-20572CVE-2022-21123CVE-2022-21125CVE-2022-21166CVE-2022-21505CVE-2022-26373CVE-2022-32250CVE-2022-32296CVE-2022-34918CVE-2022-36123CVE-2022-36280CVE-2022-36879CVE-2022-36946CVE-2022-39188CVE-2022-39190CVE-2022-40307CVE-2022-40768CVE-2022-41218CVE-2022-41222CVE-2022-41674CVE-2022-41849CVE-2022-41850CVE-2022-42328CVE-2022-42329CVE-2022-42432CVE-2022-42703CVE-2022-42719CVE-2022-42720CVE-2022-42721CVE-2022-42722CVE-2022-42895CVE-2022-42896CVE-2022-43750CVE-2022-47518CVE-2022-47520CVE-2022-47929CVE-2022-47946CVE-2023-0215CVE-2023-0286CVE-2023-0464CVE-2023-0465CVE-2023-0466CVE-2023-0590CVE-2023-1077CVE-2023-1095CVE-2023-1206CVE-2023-2898CVE-2023-3141CVE-2023-3268CVE-2023-3338CVE-2023-3389CVE-2023-3446CVE-2023-3609CVE-2023-3610CVE-2023-3611CVE-2023-3772CVE-2023-3773CVE-2023-3777CVE-2023-4004CVE-2023-4015CVE-2023-4273CVE-2023-4623CVE-2023-4911CVE-2023-4921CVE-2023-5178CVE-2023-5197CVE-2023-5678CVE-2023-5717CVE-2023-6606CVE-2023-6931CVE-2023-6932CVE-2023-7008CVE-2023-7104CVE-2023-23454CVE-2023-23455CVE-2023-23559CVE-2023-26607CVE-2023-31085CVE-2023-31436CVE-2023-32233CVE-2023-35001CVE-2023-35827CVE-2023-36660CVE-2023-37453CVE-2023-39189CVE-2023-39192CVE-2023-39193CVE-2023-39194CVE-2023-42753CVE-2023-42754CVE-2023-42755CVE-2023-45863CVE-2023-45871CVE-2023-48795CVE-2023-50495CVE-2023-51384CVE-2023-51385CVE-2023-51767CVE-2024-0232CVE-2024-0553CVE-2024-0567CVE-2024-0584CVE-2024-0684CVE-2024-22365CVE-2024-25062
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/c0cc03e2-d4ca-4ff2-a9a6-4592a1fd5887