Siemens SIMATIC S7-1500 CPUs
Several SIMATIC S7-1500 CPU versions contain an authentication bypass vulnerability that allows unauthenticated remote attackers to query and learn the actual and configured maximum cycle times and communication load metrics of the CPU. The vulnerability exists across SIMATIC S7-1500 CPUs, SIMATIC ET 200SP CPUs, SIMATIC Drive Controller CPUs, and related variants including SIPLUS hardened models and software-based controllers. Affected firmware versions are generally those before 2.9.8 or 3.1.4 (depending on CPU model generation). Siemens has released firmware updates for most products. For SIMATIC S7-1500 Software Controller Linux V2, no fix is planned and network isolation is the recommended mitigation.
- Network reachability to CPU Ethernet port (default port 102 for S7 communication)
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f3421864-0264-4bae-ac81-58971636caf2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.