Critical authentication flaw in Siemens SIMATIC ET 200SP Communication Processors exposes configuration data
Take action: If you're using Siemens SIMATIC ET 200SP communication processors, make sure they are isolated from the internet and accessible only from trusted networks. Then plan a regular update cucle to V2.4.24 or later. This is not an urgent patch, but don't ignore it.
Learn More
Siemens has patched a critical vulnerability in multiple SIMATIC ET 200SP communication processor models that could allow unauthenticated remote attackers to access sensitive configuration data.
The vulnerability is tracked as CVE-2025-40771 (CVSS score 9.3), is a Missing Authentication for Critical Function vulnerability that fails to properly authenticate configuration connections, enabling attackers to bypass security controls entirely and gain access to configuration data that manages the communication processors.
The vulnerability impacts six product lines within the Siemens SIMATIC ET 200SP family:
- Siemens SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0): All versions prior to V2.4.24
- Siemens SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0): All versions prior to V2.4.24
- Siemens SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0): All versions prior to V2.4.24
- Siemens SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0): All versions prior to V2.4.24
- Siemens SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0): All versions prior to V2.4.24
- Siemens SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0): All versions prior to V2.4.24
All affected products should be updated to version V2.4.24 or later.
Organizations unable to immediately update to version V2.4.24 or should must implement network access restrictions as an interim measure.