Siemens SIMATIC MV500 Devices
SIMATIC MV500 devices before V3.3.4 contain multiple vulnerabilities in the web server and third-party components, including buffer overflows (CWE-120, CWE-787), improper input validation (CWE-20), weak cryptography (CWE-326), and resource exhaustion issues (CWE-770, CWE-400). These weaknesses could allow an unauthenticated attacker with network access to remotely execute arbitrary code, access sensitive information, or cause denial of service. The vulnerabilities affect all six MV500 model variants (MV540 H/S, MV550 H/S, MV560 U/X) in versions prior to 3.3.4.
- Network access to the MV500 device's web server interface (typically port 80/443)
- Device must be running firmware version prior to V3.3.4
- No authentication required to trigger most vulnerabilities
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c3b8ffca-def3-43e7-bcf4-c07d4c137b08Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.