Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs
An authentication bypass in the web server of SIMATIC S7-1500 CPUs, SIMATIC ET 200SP CPUs, SIMATIC Drive Controller CPUs, SIMATIC S7-1500 Software Controllers, and related SIPLUS variants allows an unauthenticated remote attacker to retrieve sensitive CPU performance metrics including maximum cycle times and communication load. The vulnerability affects dozens of CPU model variants across multiple product families. No code execution or operational disruption occurs, but the disclosed metrics provide reconnaissance data for further attacks. Siemens has released firmware updates for most affected products; for SIMATIC S7-1500 Software Controller Linux V2 (all versions), no fix is planned.
- Network connectivity to the Ethernet port of the CPU
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b3d60002-1261-4412-9531-aa848a011b8c