Jan. 9, 2024, midnight |

Siemens ProductCERT Security Advisories cert-portal.siemens.com

SIMATIC CN 4100 is vulnerable to authorization bypass through user-controlled key, use of default credentials and unauthenticated IP address change that could allow an attacker to remotely login as root or cause denial of service condition of the device.


Siemens has released a new version for SIMATIC CN 4100 and recommends to update to the latest version.

address attacker authorization bypass change credentials default default credentials denial of service device ip address key login root service siemens simatic simatic cn 4100 ssa unauthenticated version vulnerabilities vulnerable

More from cert-portal.siemens.com / Siemens ProductCERT Security Advisories

EY- GDS- Cybersecurity- Staff

@ EY | Miguel Hidalgo, MX, 11520

Staff Security Operations Engineer

@ Workiva | Ames

Public Relations Senior Account Executive (B2B Tech/Cybersecurity/Enterprise)

@ Highwire Public Relations | Los Angeles, CA

Airbus Canada - Responsable Cyber sécurité produit / Product Cyber Security Responsible

@ Airbus | Mirabel

Investigations (OSINT) Manager

@ Logically | India

Security Engineer I, Offensive Security Penetration Testing

@ Amazon.com | US, NY, Virtual Location - New York