Home

Description

A vulnerability has been identified in SIMATIC S7-1200 CPU V1 family (incl. SIPLUS variants) (All versions < V2.0.2), SIMATIC S7-1200 CPU V2 family (incl. SIPLUS variants) (All versions < V2.0.2). Affected controllers are vulnerable to capture-replay in the communication with the engineering software. This could allow an on-path attacker between the engineering software and the controller to execute any previously recorded commands at a later time (e.g. set the controller to STOP), regardless whether or not the controller had a password configured.

PUBLISHED Reserved 2025-05-22 | Published 2025-10-14 | Updated 2025-10-14 | Assigner siemens




HIGH: 7.4CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
HIGH: 8.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-294: Authentication Bypass by Capture-replay

Product status

Default status
unknown

Any version before V2.0.2
affected

Default status
unknown

Any version before V2.0.2
affected

References

cert-portal.siemens.com/productcert/html/ssa-625789.html

cve.org (CVE-2011-20002)

nvd.nist.gov (CVE-2011-20002)

Download JSON