Feb. 8, 2022, midnight |

Siemens ProductCERT Security Advisories cert-portal.siemens.com

A vulnerability has been identified in the underlying TCP/IP stack of LOGO! CMR and SIMATIC RTU 3000 devices. It could allow an attacker with network access to the LAN interface of an affected device to hijack an ongoing connection or spoof a new one. The WAN interface, however, is not affected.


Siemens has released updates for the affected products and recommends to update to the latest versions.

access attacker device devices hijack interface ip stack lan logo network network access rtu simatic spoof ssa stack tcp update vulnerability

More from cert-portal.siemens.com / Siemens ProductCERT Security Advisories

Senior Security Officer

@ eSimplicity | Remote

Senior - Automated Cyber Attack Engineer

@ Deloitte | Madrid, España

Public Key Infrastructure (PKI) Senior Engineer

@ Sherwin-Williams | Cleveland, OH, United States

Consultant, Technology Consulting, Cyber Security - Privacy (Senior) (Multiple Positions) (1502793)

@ EY | Chicago, IL, US, 60606

Principal Associate, CSOC Analyst

@ Capital One | McLean, VA

Real Estate Portfolio & Corporate Security Lead

@ Lilium | Munich