Siemens SIMATIC
SIMATIC S7-1500, ET 200SP, and Drive Controller CPUs contain a code injection vulnerability in the web interface trace file import functionality. A specially crafted trace file uploaded via the web interface (Port 80/443) can execute arbitrary code on the PLC. This affects all versions of many CPU variants; some variants (S7-1500 and ET 200SP CPUs with firmware < 4.1.2) have fixes available, while others have no planned remediation. The web interface is enabled by default, exposing the vulnerability on any network-connected PLC.
- User must have web interface access to the PLC (typically local network or engineering workstation)
- User must be tricked into uploading/importing a specially crafted trace file
- Web server must be enabled on the affected CPU (enabled by default)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/46cbb179-0d0e-4e7b-b724-a747830e3d4aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.