A vulnerability has been identified in SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.4.24), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.4.24), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.4.24), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.4.24), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.4.24), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.4.24). Affected devices do not properly authenticate configuration connections. This could allow an unauthenticated remote attacker to access the configuration data.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 20 Oct 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Siemens
Siemens simatic Cp 1542sp-1
Siemens simatic Cp 1542sp-1 Irc
Siemens simatic Cp 1543sp-1
Siemens siplus Et 200sp Cp 1542sp-1 Irc Tx Rail
Siemens siplus Et 200sp Cp 1543sp-1 Isec
Siemens siplus Et 200sp Cp 1543sp-1 Isec Tx Rail
Vendors & Products Siemens
Siemens simatic Cp 1542sp-1
Siemens simatic Cp 1542sp-1 Irc
Siemens simatic Cp 1543sp-1
Siemens siplus Et 200sp Cp 1542sp-1 Irc Tx Rail
Siemens siplus Et 200sp Cp 1543sp-1 Isec
Siemens siplus Et 200sp Cp 1543sp-1 Isec Tx Rail

Tue, 14 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Oct 2025 09:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.4.24), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.4.24), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.4.24), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.4.24), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.4.24), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.4.24). Affected devices do not properly authenticate configuration connections. This could allow an unauthenticated remote attacker to access the configuration data.
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2025-10-14T18:59:41.570Z

Reserved: 2025-04-16T08:39:30.033Z

Link: CVE-2025-40771

cve-icon Vulnrichment

Updated: 2025-10-14T18:59:38.190Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-14T10:15:38.297

Modified: 2025-10-14T19:36:29.240

Link: CVE-2025-40771

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-20T15:52:38Z

Weaknesses