Eval Injection Vulnerability in SIMATIC S7-1500
SIMATIC S7-1500 devices and related Siemens controllers contain an eval injection vulnerability in the trace file import function of the web interface. An attacker could craft a malicious trace file that, when imported by a legitimate user, injects and executes arbitrary code on the affected device. This affects SIMATIC S7-1500 CPUs (all models from 1511 through 1518), SIMATIC Drive Controller CPUs (1504D TF, 1507D TF), SIMATIC ET 200SP CPUs, ET 200SP Open Controller CPUs, ET 200pro CPUs, SIMATIC S7-1500 Software Controllers, SIMATIC S7-PLCSIM Advanced, SIPLUS ET 200SP variants, and SIPLUS S7-1500 variants. Siemens has released fixes (firmware version 4.1.2 or later) for several product lines but has not provided fixes for many variants, which remain end-of-life or without planned remediation.
- Access to the web interface of the SIMATIC S7-1500 device
- Social engineering to convince an authorized user to import a malicious trace file
- User interaction required (clicking import button)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/04e4d512-a889-4bf8-a440-d626ef643118