OTPulse

Weak Authentication Vulnerability in Siemens Industrial Edge Devices

Act Now9.8SSA-634640Apr 8, 2025
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

Siemens Industrial Edge Devices contain a weak authentication vulnerability (CWE-1390) that allows an unauthenticated remote attacker to bypass authentication and impersonate a legitimate user. This affects Industrial Edge Own Device (IEOD), Industrial Edge Virtual Device, SCALANCE LPE9413, and all SIMATIC IPC-series Industrial Edge Devices. An attacker could gain full administrative access without needing valid credentials, enabling unauthorized changes to device configurations and operational settings.

What this means
What could happen
An attacker could bypass authentication on these Industrial Edge Devices and impersonate a legitimate administrator, allowing them to execute arbitrary commands, modify system configurations, or interrupt operations without needing valid credentials.
Who's at risk
Manufacturing facilities using Siemens Industrial Edge Devices for local data collection, processing, or edge computing. This includes anyone running SIMATIC IPC series edge devices, SCALANCE LPE9413 network modules, or standalone Industrial Edge Own/Virtual Devices for process monitoring, predictive maintenance, or real-time analytics.
How it could be exploited
An attacker on the network sends a specially crafted authentication request to the Industrial Edge Device. The weak authentication mechanism accepts the request without proper credential validation, granting the attacker full administrative access to the device. The attacker can then run commands to alter process parameters, disable monitoring, or disrupt connectivity between the edge device and production systems.
Prerequisites
  • Network access to the Industrial Edge Device on its management port
  • No credentials required
remotely exploitableno authentication requiredlow complexityaffects critical infrastructure (manufacturing)CVSS score 9.8 (critical severity)
Exploitability
Low exploit probability (EPSS 0.5%)
Affected products (9)
9 with fix
ProductAffected VersionsFix Status
Industrial Edge Own Device (IEOD)All versions < V1.21.1-1-a1.21.1-1-a
Industrial Edge Virtual DeviceAll versions < V1.21.1-1-a1.21.1-1-a
SCALANCE LPE9413< V2.12.1
SIMATIC IPC127E Industrial Edge Device< V3.03.0
SIMATIC IPC227E Industrial Edge Device< V3.03.0
SIMATIC IPC427E Industrial Edge Device< V3.03.0
SIMATIC IPC847E Industrial Edge Device< V3.03.0
SIMATIC IPC BX-39A Industrial Edge Device< V3.03.0
Remediation & Mitigation
0/6
Do now
0/1
WORKAROUNDRestrict network access to Industrial Edge Device management interfaces using firewall rules to trusted engineering workstations only
Schedule — requires maintenance window
0/4

Patching may require device reboot — plan for process interruption

Industrial Edge Own Device (IEOD)
HOTFIXUpdate Industrial Edge Own Device (IEOD) to version 1.21.1-1-a or later
Industrial Edge Virtual Device
HOTFIXUpdate Industrial Edge Virtual Device to version 1.21.1-1-a or later
SCALANCE LPE9413
HOTFIXUpdate SCALANCE LPE9413 to version 2.1 or later
All products
HOTFIXUpdate SIMATIC IPC127E, IPC227E, IPC427E, IPC847E, IPC BX-39A, and IPC BX-59A Industrial Edge Devices to version 3.0 or later
Long-term hardening
0/1
HARDENINGImplement network segmentation to isolate Industrial Edge Devices on a separate VLAN from untrusted networks
↑↓ Navigate · Esc Close
API: /api/v1/advisories/2bf9314f-55cc-42eb-aad0-54a3232596e2
Weak Authentication Vulnerability in Siemens Industrial Edge Devices | CVSS 9.8 - OTPulse