CVE-2022-42784

7.6 HIGH

📋 TL;DR

This vulnerability affects Siemens LOGO! programmable logic controllers (PLCs) and allows attackers to perform electromagnetic fault injection attacks. Successful exploitation could enable firmware dumping, memory manipulation, and certificate injection, potentially allowing device impersonation and unauthorized communication. All LOGO! devices running firmware version V8.3 or higher are affected.

💻 Affected Systems

Products:
  • LOGO! 12/24RCE (6ED1052-1MD08-0BA1)
  • LOGO! 12/24RCEo (6ED1052-2MD08-0BA1)
  • LOGO! 230RCE (6ED1052-1FB08-0BA1)
  • LOGO! 230RCEo (6ED1052-2FB08-0BA1)
  • LOGO! 24CE (6ED1052-1CC08-0BA1)
  • LOGO! 24CEo (6ED1052-2CC08-0BA1)
  • LOGO! 24RCE (6ED1052-1HB08-0BA1)
  • LOGO! 24RCEo (6ED1052-2HB08-0BA1)
  • SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1)
  • SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1)
  • SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1)
  • SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1)
  • SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1)
  • SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1)
  • SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1)
  • SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1)
Versions: All versions >= V8.3
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All listed LOGO! PLC models with firmware V8.3 or higher are vulnerable by default. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could dump firmware, manipulate device memory, inject custom certificates signed by the product CA, impersonate legitimate devices, and potentially gain full control over industrial processes.

🟠

Likely Case

Skilled attackers with physical access could extract firmware secrets, manipulate device behavior, or create rogue devices that appear legitimate to the network.

🟢

If Mitigated

With proper physical security controls and network segmentation, the impact is limited to isolated systems with no ability to propagate to other network segments.

🌐 Internet-Facing: LOW - This attack requires physical proximity and electromagnetic fault injection equipment, making remote exploitation impractical.
🏢 Internal Only: MEDIUM - Within industrial facilities, attackers with physical access could exploit this, but it requires specialized equipment and knowledge.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Exploitation requires physical access and specialized electromagnetic fault injection equipment. No authentication is needed once physical access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to firmware version V8.4 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-844582.html

Restart Required: Yes

Instructions:

1. Download firmware update from Siemens Industry Online Support
2. Connect to LOGO! device using LOGO! Soft Comfort software
3. Backup current configuration and program
4. Upload new firmware version V8.4 or later
5. Restart the device
6. Restore configuration and program
7. Verify firmware version is updated

🔧 Temporary Workarounds

Physical Security Enhancement

all

Implement strict physical access controls to prevent unauthorized personnel from accessing LOGO! devices

Network Segmentation

all

Isolate LOGO! devices in separate network segments with strict firewall rules to limit communication

🧯 If You Can't Patch

  • Implement strict physical security controls including locked cabinets, surveillance, and access logging
  • Deploy network monitoring to detect anomalous device communications or certificate changes
  • Consider replacing vulnerable devices with updated models if critical systems are affected

🔍 How to Verify

Check if Vulnerable:

Check device firmware version through LOGO! Soft Comfort software or web interface. If version is V8.3 or higher, the device is vulnerable.

Check Version:

Use LOGO! Soft Comfort software: Connect to device → Device → Device Information → Check Firmware Version

Verify Fix Applied:

After updating, verify firmware version shows V8.4 or later in LOGO! Soft Comfort software or device interface.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device restarts or firmware update attempts
  • Certificate changes or new certificate installations
  • Unusual physical access logs to device locations

Network Indicators:

  • Unexpected certificate-based authentication attempts
  • Communication from devices with unusual certificates
  • Traffic patterns inconsistent with normal PLC operations

SIEM Query:

Search for: (device_type="LOGO! PLC") AND (event_type="firmware_update" OR "certificate_change" OR "unexpected_restart")

🔗 References

📤 Share & Export