CVE-2021-37172

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authentication on Siemens SIMATIC S7-1200 PLCs when provisioned with TIA Portal V13, enabling unauthorized program downloads. It affects SIMATIC S7-1200 CPU family (including SIPLUS variants) version 4.5.0. The vulnerability does not occur when devices were provisioned with TIA Portal V13 SP1 or later.

💻 Affected Systems

Products:
  • SIMATIC S7-1200 CPU family
  • SIPLUS variants
Versions: V4.5.0
Operating Systems: PLC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices provisioned using TIA Portal V13 (not V13 SP1 or later). Devices provisioned with TIA Portal V13 SP1 or later versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of industrial PLCs, allowing them to download malicious programs that could disrupt physical processes, cause equipment damage, or create safety hazards in industrial environments.

🟠

Likely Case

Unauthorized access to PLCs enabling program modification, data theft, or disruption of industrial operations by attackers with network access to affected devices.

🟢

If Mitigated

Limited impact with proper network segmentation, access controls, and monitoring preventing unauthorized access to industrial control networks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires TIA Portal V13 or later and network access to the PLC. The vulnerability is an authentication bypass, making exploitation straightforward for attackers with the right tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Provision with TIA Portal V13 SP1 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-830194.pdf

Restart Required: Yes

Instructions:

1. Update TIA Portal to V13 SP1 or later. 2. Reprovision affected PLCs using the updated TIA Portal. 3. Restart PLCs to apply changes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLCs from untrusted networks using firewalls and VLANs

Access Control Lists

all

Restrict network access to PLCs to authorized engineering stations only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PLCs from all untrusted networks
  • Monitor network traffic to PLCs for unauthorized access attempts and program downloads

🔍 How to Verify

Check if Vulnerable:

Check if PLC was provisioned using TIA Portal V13 (not SP1 or later) by reviewing provisioning records or checking TIA Portal version history.

Check Version:

Check PLC firmware version via TIA Portal or web interface

Verify Fix Applied:

Verify PLC was reprovisioned using TIA Portal V13 SP1 or later and test authentication requirements for program downloads.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized program download attempts
  • Authentication bypass events
  • Connection attempts from unauthorized TIA Portal instances

Network Indicators:

  • Unexpected S7 communications to PLCs
  • Program download traffic from unauthorized sources

SIEM Query:

Search for S7 protocol traffic to PLCs from unauthorized source IPs or outside expected engineering workstations

🔗 References

📤 Share & Export