CVE Alert: CVE-2011-20002 – Siemens – SIMATIC S7-1200 CPU V1 family (incl. SIPLUS variants)

CVE-2011-20002

HIGHNo exploitation known

A vulnerability has been identified in SIMATIC S7-1200 CPU V1 family (incl. SIPLUS variants) (All versions < V2.0.2), SIMATIC S7-1200 CPU V2 family (incl. SIPLUS variants) (All versions < V2.0.2). Affected controllers are vulnerable to capture-replay in the communication with the engineering software. This could allow an on-path attacker between the engineering software and the controller to execute any previously recorded commands at a later time (e.g. set the controller to STOP), regardless whether or not the controller had a password configured.

CVSS v3.1 (7.4)
Vendor
Siemens, Siemens
Product
SIMATIC S7-1200 CPU V1 family (incl. SIPLUS variants), SIMATIC S7-1200 CPU V2 family (incl. SIPLUS variants)
Versions
0 lt V2.0.2 | 0 lt V2.0.2
CWE
CWE-294, CWE-294: Authentication Bypass by Capture-replay
Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
Published
2025-10-14T09:14:55.159Z
Updated
2025-10-14T18:58:30.327Z

AI Summary Analysis

Risk verdict

High risk of authentication bypass via capture-replay between engineering software and S7-1200 controllers; no confirmed public exploit is indicated at this time.

Why this matters

If an attacker can replay recorded commands (including critical operations), they could disrupt or stop processes, causing downtime, safety risks, and potential regulatory or financial impacts. The issue targets engineering pathways, so downtime in industrial environments can translate to production delays and equipment wear.

Most likely attack path

An attacker would need access to the same network path used by engineering software and PLCs (no user interaction or privileges required). Once observed traffic is captured, previously valid commands could be replayed to force undesired states (e.g., STOP) without credentials. The gap arises in untrusted or unencrypted on-path communications, enabling manipulation without altering credentials.

Who is most exposed

Facilities employing Siemens SIMATIC S7-1200 systems with engineering workstations connected across plant networks are most at risk, especially where remote access or VPN-linked tooling exposes the engineering path.

Detection ideas

  • Replayed or identical command sequences observed at unusual intervals.
  • Sudden state changes in controllers without corresponding legitimate inputs.
  • Anomalies in engineering software traffic patterns or timing gaps.
  • Logs showing successful commands that violate normal workflow order.
  • Unusual lack of authentication prompts on critical PLC commands.

Mitigation and prioritisation

  • Apply firmware/software upgrade to the affected family (2.0.2 or later) per vendor guidance; verify compatibility in a test environment.
  • Tighten network segmentation: limit engineering workstations to PLC subnets; enforce encrypted, authenticated channels.
  • Implement mutual authentication between engineering tools and controllers; disable unverified sessions.
  • Monitor for replay-like traffic and implement anomaly detection on command sequences.
  • Schedule change-management steps: test, back-ups, and rollback plans before production deployment. If exploitation indicators or EPSS-like signals emerge, treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.