First published: Tue Sep 10 2024(Updated: )
A vulnerability has been identified in SIMATIC S7-200 SMART CPU CR40 (6ES7288-1CR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU CR60 (6ES7288-1CR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR30 (6ES7288-1SR30-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR30 (6ES7288-1SR30-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR40 (6ES7288-1SR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR40 (6ES7288-1SR40-0AA1) (All versions), SIMATIC S7-200 SMART CPU SR60 (6ES7288-1SR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR60 (6ES7288-1SR60-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST20 (6ES7288-1ST20-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST20 (6ES7288-1ST20-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST30 (6ES7288-1ST30-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST30 (6ES7288-1ST30-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST40 (6ES7288-1ST40-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST40 (6ES7288-1ST40-0AA1) (All versions), SIMATIC S7-200 SMART CPU ST60 (6ES7288-1ST60-0AA0) (All versions), SIMATIC S7-200 SMART CPU ST60 (6ES7288-1ST60-0AA1) (All versions). Affected devices do not properly handle TCP packets with an incorrect structure. This could allow an unauthenticated remote attacker to cause a denial of service condition. To restore normal operations, the network cable of the device needs to be unplugged and re-plugged.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC S7-200 SMART CPU CR40 firmware | <=All versions | |
Siemens SIMATIC S7-200 SMART CPU CR60 firmware | <=All versions | |
Siemens SIMATIC S7-200 SMART | <=All versions | |
Siemens SIMATIC S7-200 SMART CPU SR30 Firmware | <=All versions | |
Siemens SIMATIC S7-200 SMART CPU SR40 | <=All versions | |
Siemens SIMATIC S7-200 SMART | <=All versions | |
Siemens SIMATIC S7-200 SMART ST CPU | <=All versions | |
Siemens SIMATIC S7-200 SMART | <=All versions | |
Siemens SIMATIC S7-200 SMART CPU ST40 firmware | <=All versions | |
Siemens SIMATIC S7-200 SMART | <=All versions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43647 is classified as a high severity vulnerability affecting multiple Siemens SIMATIC S7-200 SMART CPUs.
To address CVE-2024-43647, users should apply the latest firmware updates provided by Siemens for the affected S7-200 SMART CPU models.
CVE-2024-43647 affects all versions of the Siemens SIMATIC S7-200 SMART CPU CR40, CR60, SR20, and other variants.
Exploitation of CVE-2024-43647 could lead to unauthorized access or control over the affected systems.
As of now, the recommended approach for CVE-2024-43647 is to upgrade to the patched version rather than relying on a workaround.