Missing CSRF Protection in the Web Server Login Page of Industrial Controllers
The web server login page in affected Siemens SIMATIC controllers lacks proper Cross-Site Request Forgery (CSRF) protection. An authenticated attacker could exploit this by crafting a malicious webpage that, when visited by a logged-in engineer, sends forged requests to the controller to determine if the user is still authenticated. This allows tracking of engineering access patterns. The vulnerability requires the victim to already be logged in and to visit a malicious site controlled by the attacker; it does not permit unauthorized login, credential theft, or direct alteration of controller logic or process parameters. Affects SIMATIC S7-300, S7-400, S7-1200, S7-1500 CPUs, ET 200 series, Drive Controllers, and WinCC Runtime Advanced software.
- Engineering workstation or HMI with web browser access to controller port 80 or 443
- Victim must already be logged into the controller's web interface in another browser tab
- Victim must visit attacker-controlled website while logged in
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d0792f9e-72dd-4614-9536-6abe9cb150e6