Siemens SIMATIC
Multiple Siemens SIMATIC products are affected by a timing-based side-channel vulnerability in OpenSSL RSA Decryption (CVE-2023-4304). An attacker with network access can observe the timing of RSA decryption operations and statistically extract the private key over multiple observations, compromising the confidentiality of encrypted communications between controllers, engineering workstations, and remote gateways. The vulnerability exists in the OpenSSL cryptographic library used by Siemens firmware for RSA key operations. Affected products include S7-1200 and S7-1500 PLC families, ET 200 distributed I/O modules, SIMATIC Cloud Connect 7 gateways, Process Historian servers, and related software tools. Siemens has released firmware updates for most products; however, several legacy and specialized models (certain S7-1500 variants, SIMATIC Logon V1.6, and Process Historian 2019/2020) will not receive fixes due to end-of-life status.
- Network access to monitor encrypted traffic to/from the affected Siemens controller
- Ability to capture multiple RSA-encrypted messages and measure precise decryption timing (millisecond-level precision)
- No authentication required to observe network timing
- Controller must be using OpenSSL for RSA decryption (built into the SIMATIC firmware)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c8215dd5-d5c6-4b3c-8ecb-b8f2bd4a632d