Publication Date:
Last Update:
Current Version: V1.3
CVSS v3.1 Base Score: 9.8
Un-/Collapse All
Affected Product and Versions Remediation
Expand children
Currently no fix is planned
Expand children
Currently no fix is planned
Expand children
Currently no fix is planned
Expand children
Currently no fix is planned
  • Restrict access to port 135/tcp to trusted IP addresses only
  • Only for versions < V8.3: Restrict access to port 10005/tcp to trusted IP addresses only
  • Only for versions >= V8.3: Restrict access to port 8443/tcp to trusted IP addresses only

Please follow the General Security Recommendations.

As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity

Un-/Collapse All

This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.

CVSS v3.1 Base Score 9.8
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:T/RC:C
CWE CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVSS v3.1 Base Score 7.5
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:T/RC:C
CWE CWE-20: Improper Input Validation
CVSS v3.1 Base Score 5.3
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:T/RC:C
CWE CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input

  • Cyber Research Group from Raytheon UK for reporting the vulnerabilities

Siemens has released new hardware versions with the LOGO! V8.4 BM and the SIPLUS LOGO! V8.4 BM product families for all affected devices. Those new hardware versions fixes the vulnerabilities CVE-2022-36361 and CVE-2022-36363:

  • LOGO! 12/24RCE (6ED1052-1MD08-0BA2)
  • LOGO! 12/24RCEo (6ED1052-2MD08-0BA2)
  • LOGO! 230RCE (6ED1052-1FB08-0BA2)
  • LOGO! 230RCEo (6ED1052-2FB08-0BA2)
  • LOGO! 24CE (6ED1052-1CC08-0BA2)
  • LOGO! 24CEo (6ED1052-2CC08-0BA2)
  • LOGO! 24RCE (6ED1052-1HB08-0BA2)
  • LOGO! 24RCEo (6ED1052-2HB08-0BA2)
  • SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA2)
  • SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA2)
  • SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA2)
  • SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA2)
  • SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA2)
  • SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA2)
  • SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA2)
  • SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA2)

For more information please also refer to the related product support article: https://support.industry.siemens.com/cs/ww/en/view/109826554/.

https://www.siemens.com/cert/advisories
V1.0 (2022-10-11): Publication Date
V1.1 (2023-12-12): Added information about additional new LOGO! V8.4 BM hardware versions
V1.2 (2024-09-10): Added information about additional new SIPLUS LOGO! hardware versions: SIPLUS LOGO! 24CE and SIPLUS LOGO! 230RCE
V1.3 (2024-10-08): Added information about additional new SIPLUS LOGO! hardware versions