CVE-2022-43768
📋 TL;DR
A denial-of-service vulnerability exists in the webserver of multiple Siemens SIMATIC communication processors. Attackers can crash the webserver component, disrupting web-based management interfaces. This affects industrial control system components used in critical infrastructure and manufacturing environments.
💻 Affected Systems
- SIMATIC CP 1242-7 V2
- SIMATIC CP 1243-1
- SIMATIC CP 1243-1 DNP3
- SIMATIC CP 1243-1 IEC
- SIMATIC CP 1243-7 LTE EU
- SIMATIC CP 1243-7 LTE US
- SIMATIC CP 1243-8 IRC
- SIMATIC CP 1542SP-1
- SIMATIC CP 1542SP-1 IRC
- SIMATIC CP 1543SP-1
- SIMATIC CP 443-1
- SIMATIC CP 443-1 Advanced
- SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL
- SIPLUS ET 200SP CP 1543SP-1 ISEC
- SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL
- SIPLUS NET CP 1242-7 V2
- SIPLUS NET CP 443-1
- SIPLUS NET CP 443-1 Advanced
- SIPLUS S7-1200 CP 1243-1
- SIPLUS S7-1200 CP 1243-1 RAIL
- SIPLUS TIM 1531 IRC
- TIM 1531 IRC
📦 What is this software?
Simatic Cp 1243 1 Dnp3 Firmware by Siemens
Simatic Cp 1243 7 Lte Eu Firmware by Siemens
Simatic Cp 1243 7 Lte Us Firmware by Siemens
Simatic Cp 1542sp 1 Irc Firmware by Siemens
Simatic Cp 443 1 Advanced Firmware by Siemens
View all CVEs affecting Simatic Cp 443 1 Advanced Firmware →
Simatic Ipc Diagmonitor Firmware by Siemens
Siplus Et 200sp Cp 1542sp 1 Irc Tx Rail Firmware by Siemens
View all CVEs affecting Siplus Et 200sp Cp 1542sp 1 Irc Tx Rail Firmware →
Siplus Et 200sp Cp 1543sp 1 Isec Firmware by Siemens
View all CVEs affecting Siplus Et 200sp Cp 1543sp 1 Isec Firmware →
Siplus Et 200sp Cp 1543sp 1 Isec Tx Rail Firmware by Siemens
View all CVEs affecting Siplus Et 200sp Cp 1543sp 1 Isec Tx Rail Firmware →
Siplus Net Cp 1242 7 V2 Firmware by Siemens
Siplus Net Cp 443 1 Advanced Firmware by Siemens
View all CVEs affecting Siplus Net Cp 443 1 Advanced Firmware →
Siplus S7 1200 Cp 1243 1 Firmware by Siemens
⚠️ Risk & Real-World Impact
Worst Case
Complete loss of web-based management capabilities, requiring physical access to restore functionality, potentially disrupting industrial operations.
Likely Case
Temporary unavailability of web management interface until device restart, causing operational inconvenience but not affecting core control functions.
If Mitigated
Minimal impact if web interface is disabled or network access is restricted, with core PLC communication remaining functional.
🎯 Exploit Status
Based on CVSS score and description, exploitation appears straightforward for attackers with network access to the webserver.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V3.4.29 for CP 124x series, V2.3 for CP 154x series, V3.3 for CP 443 series, V2.3.6 for TIM 1531 IRC
Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-139628.html
Restart Required: Yes
Instructions:
1. Download firmware update from Siemens Industry Online Support. 2. Backup device configuration. 3. Apply firmware update via TIA Portal or appropriate programming software. 4. Restart device. 5. Verify web interface functionality.
🔧 Temporary Workarounds
Disable Web Interface
allDisable the webserver component if web management is not required
Configure via TIA Portal or device configuration tool to disable HTTP/HTTPS services
Network Segmentation
allRestrict network access to web interface using firewalls or VLANs
Add firewall rules to block external access to TCP ports 80/443 on affected devices
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected devices from untrusted networks
- Disable web interface entirely and use alternative management methods (TIA Portal, console)
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via TIA Portal Project > Online & Diagnostics > Online access > Firmware version
Check Version:
No CLI command; use TIA Portal or device web interface to check firmware version
Verify Fix Applied:
Verify firmware version is at or above patched version and test web interface functionality
📡 Detection & Monitoring
Log Indicators:
- Webserver crash logs
- Repeated connection attempts to web interface
- Unusual traffic patterns to device web ports
Network Indicators:
- Multiple HTTP requests to device web interface followed by service unavailability
- Port scanning activity targeting industrial device web ports
SIEM Query:
source="industrial-firewall" dest_port IN (80,443) AND dest_ip IN (affected_device_ips) AND event_count > threshold
🔗 References
- https://cert-portal.siemens.com/productcert/html/ssa-139628.html
- https://cert-portal.siemens.com/productcert/html/ssa-566905.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-566905.pdf
- https://cert-portal.siemens.com/productcert/html/ssa-139628.html
- https://cert-portal.siemens.com/productcert/html/ssa-566905.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-566905.pdf