Publication Date:
Last Update:
Current Version: V2.0
CVSS v3.1 Base Score: 7.5
Affected Product and Versions Remediation

All versions < V7.0.3

All versions < V7.0.3

All versions < V7.0.3

All versions < V7.0.3

All versions < V4.1.1 Patch 05
Update to V4.1.1 Patch 05 or later version

All versions < V4.5.0 Patch 01
Update to V4.5.0 Patch 01 or later version

All versions < V4.5.0

All versions < V5.2.1

All versions

All versions

All versions

All versions

All versions

All versions

All versions

All versions

All versions

All versions

All versions

All versions

All versions

All versions

All versions

All versions

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V2.8

All versions < V2.8

All versions

All versions < V3.3.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V7.0.3

All versions

All versions < V2010 SP3
Update to V2010 SP3 or later version and apply BIOS and Microsoft Windows updates

All versions < V2010 SP3
Update to V2010 SP3 or later version and apply BIOS and Microsoft Windows updates

All versions

All versions < V1.5 HF1

All versions < V1.3

All versions < V4.7 SP10 HF5

All versions < V4.7 SP10 HF5

All versions < V4.7 HF29
Update to V4.7 HF29 or upgrade to V5.2 HF2

All versions < V4.8

All versions
Update to V4.8 SP2 HF9

All versions
Update to V4.8 SP2 HF9

All versions
Update to V4.8 SP2 HF9

All versions

All versions < V4.7 HF34
Update to V4.7 HF34 or upgrade to V5.2 HF2

All versions < V4.8

All versions < V4.7 HF33
Update to V4.7 HF33

All versions

All versions < V4.8 SP5
Update to V4.8 SP5 or later version

All versions < V4.8 SP5
Update to V4.8 SP5 or later version

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.3.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V3.2.17

All versions < V7.0.3

All versions < V7.0.3
  • Disable SNMP in Versions 1 and 2c, if supported by the product.
  • Enable SNMP v3 if required and supported by the product to restrict the vulnerability to authenticated users.
  • Enable access protection and change default credentials for SNMP service, if possible
  • Restrict network access to port 161/udp of the affected product.

Product-specific remediations or mitigations can be found in the section Affected Products and Solution.
Please follow the General Security Recommendations.

As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity

The vulnerability classification has been performed by using the CVSS scoring system in version 3.1 (CVSS v3.1) (https://www.first.org/cvss/). The CVSS environmental score is specific to the customer’s environment and will impact the overall CVSS score. The environmental score should therefore be individually defined by the customer to accomplish final scoring.

An additional classification has been performed using the CWE classification, a community-developed list of common software security weaknesses. This serves as a common language and as a baseline for weakness identification, mitigation, and prevention efforts. A detailed list of CWE classes can be found at: https://cwe.mitre.org/.

CVSS v3.1 Base Score 7.5
CVSS Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
CWE CWE-400: Uncontrolled Resource Consumption

  • Artem Zinenko from Kaspersky for pointing out that SIPLUS should also be mentioned

https://www.siemens.com/cert/advisories

V1.0 (2019-10-08): Publication Date
V1.1 (2020-01-14): Added solution for SINAMICS SL150 V4.7, SIPLUS devices now explicitly mentioned in the list of affected products, correction in section "Workarounds and Mitigations"
V1.2 (2020-02-11): Added solution for SINAMICS DCP
V1.3 (2020-03-10): Added solution for SIMATIC S7-300 CPU family
V1.4 (2020-08-11): Added SIMATIC ET200ecoPN product variants (MLFB IDs) that are not affected
V1.5 (2021-02-09): Added additional SIMATIC ET200ecoPN model (6ES7148-6JG00-0BB0) as not affected
V1.6 (2021-10-12): Clarified affected ET200ecoPN models
V1.7 (2022-02-08): Clarified that no remediation is planned for ET200 devices
V1.8 (2023-01-10): SIMATIC S7-300 CPU family expanded with product specific designations, patch links and MLFBs. Added fix for SINUMERIK 840D sl.
V1.9 (2023-04-11): SIMATIC S7-400 CPU family expanded and fix added for supported versions, no fix planned for other S7-400 versions
V2.0 (2023-05-09): Removed SIMATIC S7-400 CPU devices without fix, as they do not support PROFINET and are not affected