CVE-2025-40944

7.5 HIGH

📋 TL;DR

This vulnerability affects multiple Siemens SIMATIC industrial control system modules. An attacker can send a specially crafted S7 protocol disconnect request to TCP port 102, causing affected devices to become unresponsive and require a power cycle to restore functionality.

💻 Affected Systems

Products:
  • SIMATIC ET 200AL IM 157-1 PN
  • SIMATIC ET 200MP IM 155-5 PN HF
  • SIMATIC ET 200SP IM 155-6 MF HF
  • SIMATIC ET 200SP IM 155-6 PN HA
  • SIMATIC ET 200SP IM 155-6 PN R1
  • SIMATIC ET 200SP IM 155-6 PN/2 HF
  • SIMATIC ET 200SP IM 155-6 PN/3 HF
  • SIMATIC PN/MF Coupler
  • SIMATIC PN/PN Coupler
  • SIPLUS ET 200MP IM 155-5 PN HF variants
  • SIPLUS ET 200SP IM 155-6 PN HF variants
  • SIPLUS NET PN/PN Coupler
Versions: Varies by product - see detailed version ranges in CVE description
Operating Systems: Not applicable - embedded industrial devices
Default Config Vulnerable: ⚠️ Yes
Notes: All affected devices are vulnerable in default configurations when exposed to the S7 protocol on TCP port 102.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service affecting industrial processes, requiring physical power cycling of devices to restore operations, potentially disrupting manufacturing or critical infrastructure.

🟠

Likely Case

Targeted devices become unresponsive, disrupting specific industrial automation functions until manually reset.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments.

🌐 Internet-Facing: LOW (Industrial control systems should never be directly internet-facing)
🏢 Internal Only: HIGH (Attackers with internal network access can exploit this to disrupt operations)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a valid S7 protocol Disconnect Request (COTP DR TPDU) to TCP port 102, which is straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Varies by product - see Siemens advisory SSA-674753 for specific version updates

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-674753.html

Restart Required: Yes

Instructions:

1. Review Siemens advisory SSA-674753 for affected products and fixed versions. 2. Download appropriate firmware updates from Siemens support portal. 3. Apply firmware updates following Siemens documentation. 4. Power cycle devices after update completion.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in separate network segments with strict access controls

Firewall Rules

all

Restrict access to TCP port 102 to only trusted engineering stations and controllers

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices
  • Deploy intrusion detection systems to monitor for S7 protocol anomalies on port 102

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against affected versions listed in Siemens advisory SSA-674753

Check Version:

Use Siemens TIA Portal or device web interface to check firmware version

Verify Fix Applied:

Verify firmware version has been updated to fixed versions specified in Siemens advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device disconnections
  • Multiple S7 disconnect requests from single source
  • Device requiring power cycles

Network Indicators:

  • Unusual S7 protocol traffic patterns on port 102
  • Multiple COTP DR TPDU packets from non-trusted sources

SIEM Query:

source_port:102 AND protocol:S7 AND (packet_type:DR OR disconnect_request)

🔗 References

📤 Share & Export