Publication Date:
Last Update:
Current Version: V2.1
CVSS v3.1 Base Score: 7.5
Un-/Collapse All
Affected Product and Versions Remediation

All versions < V4.1.1 Patch 05
affected by CVE-2019-10923
Update to V4.1.1 Patch 05 or later version

All versions < V4.5.0 Patch 01
affected by CVE-2019-10923
Update to V4.5.0 Patch 01 or later version

All versions < V4.5.0
affected by CVE-2019-10923

All versions < V5.2.1
affected by CVE-2019-10923
Expand children
Currently no fix is planned

All versions
affected by CVE-2019-10923
Currently no fix is planned

All versions
affected by CVE-2019-10923
Currently no fix is planned
Expand children
Expand children

All versions
affected by CVE-2019-10923
Currently no fix is planned

All versions
affected by CVE-2019-10923
Currently no fix is planned

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923
Expand children
Expand children

All versions < V2.8
affected by CVE-2019-10923

All versions < V2.8
affected by CVE-2019-10923

All versions
affected by CVE-2019-10923
Currently no fix is planned

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V7.0.3
affected by CVE-2019-10923

All versions < V7.0.3
affected by CVE-2019-10923

All versions < V7.0.3
affected by CVE-2019-10923

All versions < V7.0.3
affected by CVE-2019-10923

All versions < V7.0.3
affected by CVE-2019-10923

All versions
affected by CVE-2019-10923
Currently no fix is planned

All versions < V2010 SP3
affected by CVE-2019-10923
Update to V2010 SP3 or later version and apply BIOS and Microsoft Windows updates

All versions < V2010 SP3
affected by CVE-2019-10923
Update to V2010 SP3 or later version and apply BIOS and Microsoft Windows updates

All versions
affected by CVE-2019-10923
Currently no fix is planned

All versions < V1.5 HF1
affected by CVE-2019-10923

All versions < V1.3
affected by CVE-2019-10923

All versions < V4.7 SP10 HF5
affected by CVE-2019-10923

All versions < V4.7 SP10 HF5
affected by CVE-2019-10923

All versions < V4.7 HF29
affected by CVE-2019-10923
Update to V4.7 HF29 or upgrade to V5.2 HF2

All versions < V4.8
affected by CVE-2019-10923
Currently no fix is planned

All versions
affected by CVE-2019-10923
Update to V4.8 SP2 HF9

All versions
affected by CVE-2019-10923
Update to V4.8 SP2 HF9

All versions
affected by CVE-2019-10923
Update to V4.8 SP2 HF9

All versions
affected by CVE-2019-10923
Currently no fix is planned

All versions < V4.7 HF34
affected by CVE-2019-10923
Update to V4.7 HF34 or upgrade to V5.2 HF2

All versions < V4.8
affected by CVE-2019-10923
Currently no fix is planned

All versions < V4.7 HF33
affected by CVE-2019-10923
Update to V4.7 HF33

All versions
affected by CVE-2019-10923
Currently no fix is planned

All versions < V4.8 SP5
affected by CVE-2019-10923
Update to V4.8 SP5 or later version

All versions < V4.8 SP5
affected by CVE-2019-10923
Update to V4.8 SP5 or later version

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.3.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V3.2.17
affected by CVE-2019-10923

All versions < V7.0.3
affected by CVE-2019-10923

All versions < V7.0.3
affected by CVE-2019-10923
  • Disable SNMP in Versions 1 and 2c, if supported by the product.
  • Enable SNMP v3 if required and supported by the product to restrict the vulnerability to authenticated users.
  • Enable access protection and change default credentials for SNMP service, if possible
  • Restrict network access to port 161/udp of the affected product.

Product-specific remediations or mitigations can be found in the section Affected Products and Solution.
Please follow the General Security Recommendations.

As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity

Un-/Collapse All

This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.

CVSS v3.1 Base Score 7.5
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
CWE CWE-400: Uncontrolled Resource Consumption

  • Artem Zinenko from Kaspersky for pointing out that SIPLUS should also be mentioned

https://www.siemens.com/cert/advisories
V1.0 (2019-10-08): Publication Date
V1.1 (2020-01-14): Added solution for SINAMICS SL150 V4.7, SIPLUS devices now explicitly mentioned in the list of affected products, correction in section "Workarounds and Mitigations"
V1.2 (2020-02-11): Added solution for SINAMICS DCP
V1.3 (2020-03-10): Added solution for SIMATIC S7-300 CPU family
V1.4 (2020-08-11): Added SIMATIC ET200ecoPN product variants (MLFB IDs) that are not affected
V1.5 (2021-02-09): Added additional SIMATIC ET200ecoPN model (6ES7148-6JG00-0BB0) as not affected
V1.6 (2021-10-12): Clarified affected ET200ecoPN models
V1.7 (2022-02-08): Clarified that no remediation is planned for ET200 devices
V1.8 (2023-01-10): SIMATIC S7-300 CPU family expanded with product specific designations, patch links and MLFBs. Added fix for SINUMERIK 840D sl.
V1.9 (2023-04-11): SIMATIC S7-400 CPU family expanded and fix added for supported versions, no fix planned for other S7-400 versions
V2.0 (2023-05-09): Removed SIMATIC S7-400 CPU devices without fix, as they do not support PROFINET and are not affected
V2.1 (2024-09-10): Listed affected products individually instead of product families (e.g., for SIMATIC ET 200AL/MP/SP/pro IM families); added affected SIPLUS devices (e.g., SIPLUS ET 200xx IM)