• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
a new bug in siemens plcs could let hackers run

A New Bug in Siemens PLCs Could Let Hackers Run Malicious Code Remotely

You are here: Home / General Cyber Security News / A New Bug in Siemens PLCs Could Let Hackers Run Malicious Code Remotely
May 31, 2021

Siemens on Friday shipped firmed updates to handle a intense vulnerability in SIMATIC S7-1200 and S7-1500 programmable logic controllers (PLCs) that could be exploited by a destructive actor to remotely attain accessibility to secured areas of the memory and reach unrestricted and undetected code execution, in what the researchers describe as an attacker’s “holy grail.”

The memory protection bypass vulnerability, tracked as CVE-2020-15782 (CVSS score: 8.1), was found out by operational technology security organization Claroty by reverse-engineering the MC7 / MC7+ bytecode language utilised to execute PLC packages in the microprocessor. There’s no evidence that the weakness was abused in the wild.

password auditor

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


In an advisory issued by Siemens, the German industrial automation agency said an unauthenticated, remote attacker with network accessibility to TCP port 102 could probably compose arbitrary facts and code to guarded memory parts or browse sensitive facts to start more attacks.

“Attaining indigenous code execution on an industrial management program these as a programmable logic controller is an conclusion-goal fairly few innovative attackers have obtained,” Claroty researcher Tal Keren mentioned. “These intricate techniques have various in-memory protections that would have to be hurdled in purchase for an attacker to not only operate code of their selection, but also stay undetected.”

Not only does the new flaw permit an adversary to acquire indigenous code execution on Siemens S7 PLCs, but the complex distant attack also avoids detection by the underlying operating technique or any diagnostic software package by escaping the user sandbox to write arbitrary knowledge and code specifically into shielded memory locations.

Claroty, even so, observed that the attack would call for network obtain to the PLC as effectively as “PLC download rights.” In jailbreaking the PLC’s indigenous sandbox, the business explained it was equipped to inject a malicious kernel-degree application into the functioning technique in these types of a way that it would grant remote code execution.

This is much from the initial time unauthorized code execution has been obtained on Siemens PLCs. In 2010, the infamous Stuxnet worm leveraged various flaws in Windows to reprogram industrial command devices by modifying code on Siemens PLCs for cyber espionage and covert sabotage.

Then in 2019, scientists demonstrated a new course of attacks referred to as “Rogue7” that exploited vulnerabilities in its proprietary S7 conversation protocol to “generate a rogue engineering station which can masquerade as the TIA to the PLC and inject any messages favourable to the attacker.”

Siemens is “strongly” recommending end users to update to the most up-to-date variations to reduce the risk. The corporation reported it is really also putting together even more updates and is urging consumers to use countermeasures and workarounds for items exactly where updates are not nonetheless accessible.

Discovered this post fascinating? Comply with THN on Facebook, Twitter  and LinkedIn to browse much more exclusive articles we submit.


Some elements of this write-up are sourced from:
thehackernews.com

Previous Post: «what has the move to remote working meant for employee What has the move to remote working meant for employee monitoring?
Next Post: Your Amazon Devices to Automatically Share Your Wi-Fi With Neighbors your amazon devices to automatically share your wi fi with neighbors»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.