First published: Tue Jun 11 2024(Updated: )
A vulnerability has been identified in SIMATIC S7-200 SMART CPU CR40 (6ES7288-1CR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU CR60 (6ES7288-1CR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR30 (6ES7288-1SR30-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR30 (6ES7288-1SR30-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR40 (6ES7288-1SR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR40 (6ES7288-1SR40-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR60 (6ES7288-1SR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR60 (6ES7288-1SR60-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST20 (6ES7288-1ST20-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST20 (6ES7288-1ST20-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST30 (6ES7288-1ST30-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST30 (6ES7288-1ST30-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST40 (6ES7288-1ST40-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST40 (6ES7288-1ST40-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST60 (6ES7288-1ST60-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST60 (6ES7288-1ST60-0AA1) (All versions). Affected devices are using a predictable IP ID sequence number. This leaves the system susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack and eventually could allow an attacker to create a denial of service condition.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC S7-200 SMART CPU CR40 firmware | ||
Siemens SIMATIC S7-200 SMART CPU CR60 firmware | ||
Siemens SIMATIC S7-200 SMART | ||
Siemens SIMATIC S7-200 SMART CPU SR30 Firmware | ||
Siemens SIMATIC S7-200 SMART CPU SR40 | ||
Siemens SIMATIC S7-200 SMART | ||
Siemens SIMATIC S7-200 SMART ST CPU | ||
Siemens SIMATIC S7-200 SMART | ||
Siemens SIMATIC S7-200 SMART CPU ST40 firmware | ||
Siemens SIMATIC S7-200 SMART |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35292 is considered a critical vulnerability affecting various models of the SIMATIC S7-200 SMART CPUs.
To remediate CVE-2024-35292, update the firmware of the affected SIMATIC S7-200 SMART CPU models to the latest version provided by Siemens.
CVE-2024-35292 affects multiple models, including SIMATIC S7-200 SMART CPU CR40, CR60, SR20, SR30, SR40, SR60, ST20, ST30, ST40, and ST60.
Exploitation of CVE-2024-35292 may lead to unauthorized access and could compromise the integrity and availability of the affected control systems.
Currently, Siemens recommends applying the firmware update as the primary method to mitigate CVE-2024-35292, with no specific workarounds available.