SINAMICS S200 CVE-2024-56336

CRITICAL
Improper Authentication (CWE-287)
2025-03-11 [email protected]
9.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Mar 12, 2026 - 19:52 vuln.today
CVE Published
Mar 11, 2025 - 10:15 nvd
CRITICAL 9.8

DescriptionNVD

A vulnerability has been identified in SINAMICS S200 (All versions with serial number beginning with SZVS8, SZVS9, SZVS0 or SZVSN and the FS number is 02). The affected device contains an unlocked bootloader. This security oversight enables attackers to inject malicious code, or install untrusted firmware. The intrinsic security features designed to protect against data manipulation and unauthorized access are compromised when the bootloader is not secured.

AnalysisAI

Siemens SINAMICS S200 drives with specific serial number prefixes contain an unlocked bootloader that allows attackers to inject malicious firmware. This bypasses the device's intrinsic security features, enabling persistent compromise of industrial drive systems.

Technical ContextAI

Affected devices (serial numbers starting with SZVS8, SZVS9, SZVS0, or SZVSN with FS number 02) have a bootloader that does not enforce firmware signature validation (CWE-287). An attacker with network access can flash arbitrary firmware, bypassing secure boot protections designed to ensure only Siemens-signed code runs on the device.

Affected ProductsAI

Siemens SINAMICS S200 (serial numbers beginning with SZVS8, SZVS9, SZVS0 or SZVSN, FS number 02)

RemediationAI

No patch available from Siemens at time of analysis. Isolate affected drives on segmented OT networks. Apply strict network access controls. Monitor for unauthorized firmware update attempts.

Share

CVE-2024-56336 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy