CERT Advisories

Siemens SIMATIC and SIPLUS Products Vulnerable to DoS via S7 Protocol Flaw (ICSA-26-015-04)

2 min readSource: CISA Cybersecurity Advisories

CISA warns of a critical denial-of-service vulnerability in Siemens ET 200SP devices, exploitable via crafted S7 protocol requests, requiring manual recovery.

Siemens ET 200SP Devices Affected by Critical DoS Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed a denial-of-service (DoS) vulnerability in Siemens SIMATIC ET 200SP and SIPLUS products, tracked under ICSA-26-015-04. The flaw could allow attackers to render devices unresponsive by sending a specially crafted S7 protocol Disconnect Request (COTP DR TPDU). Affected devices require a manual power cycle to restore functionality.

Technical Details

The vulnerability stems from improper handling of Connection-Oriented Transport Protocol (COTP) Disconnect Request TPDUs within the S7 protocol, a widely used industrial communication standard. An attacker with network access to the targeted device can exploit this flaw by transmitting a valid but malicious disconnect request, causing the device to enter an unresponsive state. No authentication is required for exploitation.

Siemens has released updated firmware versions to mitigate the issue. Users are strongly advised to apply these patches promptly. For full technical specifications and patch details, refer to the CSAF advisory.

Impact Analysis

  • Operational Disruption: Successful exploitation could lead to unplanned downtime in industrial environments, particularly in sectors relying on Siemens ET 200SP for process control.
  • Physical Consequences: In critical infrastructure (e.g., manufacturing, energy), device unresponsiveness may cascade into safety risks or production halts.
  • Exploitation Likelihood: While no active exploits have been reported, the low complexity of the attack increases the risk of opportunistic targeting.

Recommendations for Security Teams

  1. Apply Siemens Patches Immediately: Update affected SIMATIC ET 200SP and SIPLUS devices to the latest firmware versions. Consult Siemens’ official advisory for version-specific guidance.
  2. Network Segmentation: Isolate OT networks from IT environments to limit exposure to potential attackers.
  3. Monitor S7 Protocol Traffic: Deploy intrusion detection/prevention systems (IDS/IPS) to detect anomalous disconnect requests.
  4. Incident Response Planning: Ensure recovery procedures include manual power-cycle protocols for affected devices.
  5. Review CISA’s Advisory: Stay informed via the original CISA advisory for updates or additional mitigations.

Security teams managing industrial control systems (ICS) should prioritize this patch, given the high impact and low barrier to exploitation.

Share