8.8
CWE
330
Advisory Published
Updated

CVE-2024-35292

First published: Tue Jun 11 2024(Updated: )

A vulnerability has been identified in SIMATIC S7-200 SMART CPU CR40 (6ES7288-1CR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU CR60 (6ES7288-1CR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR30 (6ES7288-1SR30-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR30 (6ES7288-1SR30-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR40 (6ES7288-1SR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR40 (6ES7288-1SR40-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR60 (6ES7288-1SR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR60 (6ES7288-1SR60-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST20 (6ES7288-1ST20-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST20 (6ES7288-1ST20-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST30 (6ES7288-1ST30-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST30 (6ES7288-1ST30-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST40 (6ES7288-1ST40-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST40 (6ES7288-1ST40-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST60 (6ES7288-1ST60-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST60 (6ES7288-1ST60-0AA1) (All versions). Affected devices are using a predictable IP ID sequence number. This leaves the system susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack and eventually could allow an attacker to create a denial of service condition.

Credit: productcert@siemens.com

Affected SoftwareAffected VersionHow to fix
Siemens SIMATIC S7-200 SMART CPU CR40 firmware
Siemens SIMATIC S7-200 SMART CPU CR60 firmware
Siemens SIMATIC S7-200 SMART
Siemens SIMATIC S7-200 SMART CPU SR30 Firmware
Siemens SIMATIC S7-200 SMART CPU SR40
Siemens SIMATIC S7-200 SMART
Siemens SIMATIC S7-200 SMART ST CPU
Siemens SIMATIC S7-200 SMART
Siemens SIMATIC S7-200 SMART CPU ST40 firmware
Siemens SIMATIC S7-200 SMART

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-35292?

    CVE-2024-35292 is considered a critical vulnerability affecting various models of the SIMATIC S7-200 SMART CPUs.

  • How do I fix CVE-2024-35292?

    To remediate CVE-2024-35292, update the firmware of the affected SIMATIC S7-200 SMART CPU models to the latest version provided by Siemens.

  • Which products are affected by CVE-2024-35292?

    CVE-2024-35292 affects multiple models, including SIMATIC S7-200 SMART CPU CR40, CR60, SR20, SR30, SR40, SR60, ST20, ST30, ST40, and ST60.

  • What are the potential impacts of CVE-2024-35292?

    Exploitation of CVE-2024-35292 may lead to unauthorized access and could compromise the integrity and availability of the affected control systems.

  • Is there a workaround for CVE-2024-35292?

    Currently, Siemens recommends applying the firmware update as the primary method to mitigate CVE-2024-35292, with no specific workarounds available.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203