Siemens SIMATIC S7-1500 and S7-1200 CPUs
Open redirect vulnerability in the web server of SIMATIC S7-1200 and S7-1500 CPU families, including SIPLUS variants, Drive Controllers, ET 200SP CPUs, Open Controller variants, and S7-1500 Software Controllers. An attacker can craft a malicious URL that causes the device's web server to redirect a legitimate user to an attacker-chosen website. This could be used in phishing attacks to capture credentials or deliver malware. The vulnerability is CWE-601 and requires user interaction to be exploited. Siemens has released firmware updates for most affected products. For products without fixes or not yet patched, Siemens recommends following general network security practices and not clicking links from unknown sources.
- Network access to the CPU's web interface (HTTP/HTTPS)
- User must actively click an attacker-crafted link
- No authentication required to trigger the redirect
Patching may require device reboot — plan for process interruption
/api/v1/advisories/aef06bda-4562-44ca-aa38-f4a37e6f405d