Siemens LOGO! and SIPLUS LOGO!
LOGO! V8.3 BM and SIPLUS LOGO! V8.3 BM controllers (firmware version V8.3 and later) contain a vulnerability that allows electromagnetic fault injection attacks. An attacker with physical access can use this technique to dump and debug the firmware, manipulate memory contents, and inject custom public keys that are signed by the LOGO! Product CA. This enables injection of malicious firmware that the device will trust and execute. Siemens has released new hardware versions (LOGO! V8.4 BM and SIPLUS LOGO! V8.4 BM) that fix this vulnerability and rotate the Product CA private key. No patch is available for the V8.3 hardware; only hardware replacement mitigates the issue.
- Physical access to the LOGO! V8.3 BM device
- Electromagnetic fault injection equipment
- Knowledge of LOGO! memory layout and fault injection techniques
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2e2ae634-688b-4b4a-8755-7d0d0a13b9f7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.