SSA-179516 OpenSSL Vulnerability in Industrial Products
Several Siemens industrial products contain a vulnerability in OpenSSL that could cause encrypted data to be sent in plaintext by the SSL/TLS record layer. The affected products include SIMATIC S7 CPUs (1200 and 1500 families), MindConnect IoT2040 and Nano gateways, STEP 7 and WinCC engineering software, WinCC OA supervisory systems, SIMATIC IPC diagnostic tools, ET 200SP Open Controllers, and SINUMERIK Integrate clients. An attacker on the network could intercept and read communications that should be encrypted, potentially exposing engineering credentials, process setpoints, and remote access commands. Siemens has released firmware and software updates for all affected products.
- Network access to the affected device on its SSL/TLS communication port (typically 443 or manufacturer-specific)
- Ability to observe or intercept traffic between the device and remote clients
- No credentials required; vulnerability exists in the SSL/TLS implementation itself
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d8d8e2be-189b-4531-bac9-006b0772b38a