Siemens Patches Major PLC Flaw that Bypasses Its 'Sandbox' Protection

Researchers from Claroty today detailed the memory vuln they discovered in Siemens SIMATIC S7-1200 and S7-1500 PLCs.



Researchers from ICS security vendor Claroty published details on a serious vulnerability they found in Siemens SIMATIC S7-1200 and S7-1500 PLCs that could allow an attacker to gain remote access to protected memory areas of the popular programmable logic controllers.

Siemens today issued firmware updates for both PLC models that fix the memory-protection bypass flaw (CVE-2020-15782) - which scored a CVSS 8.1 severity rating - and plans to issue more updated mitigations "for products where updates are not, or not yet available," the company said.

Related Content:

Hacking the PLC via Its Engineering Software

Special Report: Assessing Cybersecurity Risk in Today's Enterprises

New From The Edge: How Are Cyber Insurance Companies Assessing Ransomware Risk?

"A remote unauthenticated attacker with network access to port 102/tcp could potentially write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks," according to Siemens.

An attacker would need network access to the targeted PLCs as well as "PLC download rights," Claroty wrote in its blog post on the vuln, noting that there are no known attacks underway exploiting it.

Read the details about the research and the flaw here.

 

 

 

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Copyright © 2021 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service