Siemens SIMATIC
Multiple Siemens SIMATIC products contain a user enumeration vulnerability in the webserver that allows an unauthenticated remote attacker to identify valid usernames. The vulnerability affects SIMATIC ET 200SP controllers, S7-1200 and S7-1500 PLCs, SIMATIC Drive Controllers, and the S7-PLCSIM Advanced simulator across firmware versions from approximately V3.1.0 to V3.1.2 (ET 200SP/S7-1500 hardware) and V4.6 and earlier (S7-1200), and V30.1.0 to V31.1.4 (S7-1500 software controllers). User enumeration is exploitable only via HTTP (port 80/tcp); HTTPS (port 443/tcp) is not affected.
- Network reachability to HTTP port 80/tcp on the affected SIMATIC device
- Ability to send HTTP requests (no authentication required for enumeration itself)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a500a274-723d-4586-83a7-e465f4c51b7fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.