Memory Protection Bypass Vulnerability in SINUMERIK ONE and SINUMERIK MC
Plan Patch8.1SSA-434536Jul 13, 2021
Attack VectorNetwork
Auth RequiredNone
ComplexityHigh
User InteractionNone needed
Summary
SINUMERIK ONE and SINUMERIK MC are affected by a memory protection bypass vulnerability in the integrated S7-1500 CPU. An attacker could write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks on the CPU.
What this means
What could happen
An attacker could write malicious code to the controller's protected memory or read sensitive data, potentially taking control of the CNC machine or stealing confidential manufacturing data. This could halt production or compromise your manufacturing operations.
Who's at risk
Operators of Siemens CNC machines using SINUMERIK ONE or SINUMERIK MC controllers (versions before 6.15) should prioritize this fix. This affects manufacturers in automotive, aerospace, and general machine tool operations where these controllers are used for precision machining and process control.
How it could be exploited
An attacker with network access to the SINUMERIK ONE or SINUMERIK MC controller could send specially crafted network traffic to trigger the memory protection bypass. Once exploited, the attacker gains the ability to write arbitrary code to protected memory areas, allowing them to modify machine behavior or read sensitive manufacturing parameters.
Prerequisites
- Network access to the SINUMERIK ONE or MC controller
- No authentication required
remotely exploitableno authentication requiredmemory corruptionaffects industrial machinery control
Exploitability
Low exploit probability (EPSS 0.3%)
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
SINUMERIK MC< V6.156.15
SINUMERIK ONE< V6.156.15
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
SINUMERIK MC
HOTFIXUpdate SINUMERIK ONE and SINUMERIK MC to version 6.15 or later
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/db4a657b-36b1-4bd6-8826-bad3ead74ebb