Siemens SIMATIC ET 200SP Communication Processors
SIMATIC ET 200SP communication processors (CP 1542SP-1, CP 1542SP-1 IRC, CP 1543SP-1, and SIPLUS variants) contain an authentication bypass vulnerability that allows an unauthenticated remote attacker to access configuration data. The vulnerability exists because affected devices do not properly validate authentication before exposing sensitive configuration information to network requests. Siemens has released firmware version 2.4.24 and later to correct this issue across all affected product variants.
- Network access to the communication processor port
- No authentication credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1354bb7d-056e-40f1-b36e-9bfc12747eb6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.