CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

siemens

simatic_s7-1500_cpu_15prof-2_firmware

6 known vulnerabilities · sorted by CVSS score

CVE-2022-38465
CRITICAL9.3

A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V21.9), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.5.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.9.2), SIMATIC S7-1500 Software Controller (All versions < V21.9), SIMATIC S7-PLCSIM Advanced (All versions < V4.0), SINUMERIK MC (All versions < V6.21), SINUMERIK ONE (All versions < V6.21). Affected products protect the built-in global private key in a way that cannot be considered sufficient any longer. The key is used for the legacy protection of confidential configuration data and the legacy PG/PC and HMI communication. This could allow attackers to discover the private key of a CPU product family by an offline attack against a single CPU of the family. Attackers could then use this knowledge to extract confidential configuration data from projects that are protected by that key or to perform attacks against legacy PG/PC and HMI communication.

siemens / simatic_et_200_sp_open_controller_cpu_1515sp_pc2_firmware+44
Local
Published Oct 11, 2022
CVE-2021-40365
HIGH7.5

Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.

siemens / simatic_s7-plcsim_advanced_firmware+95
Network
Published Dec 13, 2022
CVE-2022-30694
MEDIUM6.5

The login endpoint /FormLogin in affected web services does not apply proper origin checking. This could allow authenticated remote attackers to track the activities of other users via a login cross-site request forgery attack.

siemens / simatic_s7-1500_software_controller+112
Network
Published Nov 8, 2022
CVE-2021-44694
MEDIUM5.5

Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.

siemens / simatic_s7-plcsim_advanced_firmware+91
Network
Published Dec 13, 2022
CVE-2021-44695
MEDIUM4.9

Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.

siemens / simatic_s7-plcsim_advanced_firmware+95
Network
Published Dec 13, 2022
CVE-2021-44693
MEDIUM4.9

Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.

siemens / simatic_s7-plcsim_advanced_firmware+95
Network
Published Dec 13, 2022