Denial of Service Vulnerability in SIMATIC S7-1500 CPUs and related products
A denial of service vulnerability exists in SIMATIC S7-1500 CPU family and related products. An attacker with network access to port 102/tcp can send a specially crafted message that crashes the CPU, halting all automation and control logic until manual restart. Affected products include SIMATIC Drive Controllers, ET 200SP controllers, S7-1500 CPUs, ET 200pro CPUs, Software Controller, PLCSIM Advanced, and SIPLUS hardened variants. Siemens has released patches for some models (versions 3.1.0, 3.1.2, 30.1.0, 6.0 depending on product), but many variants—particularly ET 200pro and SIPLUS models—have no fix available. For those products, Siemens recommends implementing countermeasures such as network access restrictions.
- Network access to port 102/tcp on the affected PLC
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5372e68d-42bd-4539-bdb1-a385d66d7854