CVE-2025-40816: CWE-306: Missing Authentication for Critical Function in Siemens LOGO! 12/24RCE
A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA2) (All versions), LOGO! 12/24RCEo (6ED1052-2MD08-0BA2) (All versions), LOGO! 230RCE (6ED1052-1FB08-0BA2) (All versions), LOGO! 230RCEo (6ED1052-2FB08-0BA2) (All versions), LOGO! 24CE (6ED1052-1CC08-0BA2) (All versions), LOGO! 24CEo (6ED1052-2CC08-0BA2) (All versions), LOGO! 24RCE (6ED1052-1HB08-0BA2) (All versions), LOGO! 24RCEo (6ED1052-2HB08-0BA2) (All versions), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA2) (All versions), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA2) (All versions), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA2) (All versions), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA2) (All versions), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA2) (All versions), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA2) (All versions), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA2) (All versions), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA2) (All versions). Affected devices do not conduct certain validations when interacting with them. This could allow an unauthenticated remote attacker to manipulate the devices IP address, which means the device would not be reachable.
AI Analysis
Technical Summary
CVE-2025-40816 identifies a critical security vulnerability in Siemens LOGO! 12/24RCE series programmable logic controllers (PLCs), including all versions of LOGO! 12/24RCE, LOGO! 230RCE, LOGO! 24CE, LOGO! 24RCE, and their SIPLUS variants. The root cause is a missing authentication mechanism for certain critical functions within the device firmware, specifically those that handle network configuration changes. This flaw allows an unauthenticated remote attacker to manipulate the device's IP address without any authentication or user interaction. The manipulation of the IP address can cause the device to become unreachable on the network, effectively resulting in a denial-of-service (DoS) condition. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), indicating that the device fails to verify the identity or permissions of entities requesting sensitive operations. The CVSS v3.1 base score is 7.6 (high severity), with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality (C:L), integrity (I:L), and availability (A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature and the critical role of these PLCs in industrial automation environments make it a significant threat. Siemens has not yet released patches, so affected organizations must rely on compensating controls. The vulnerability affects a broad range of Siemens LOGO! devices widely used in industrial control systems for small to medium automation tasks, including manufacturing, building automation, and infrastructure management.
Potential Impact
The primary impact of CVE-2025-40816 is on the availability of affected Siemens LOGO! PLC devices. By allowing unauthenticated remote attackers to change the device's IP address, the vulnerability can cause the device to become unreachable, disrupting industrial automation processes that rely on these controllers. This can lead to production downtime, safety risks, and operational inefficiencies. The limited confidentiality and integrity impacts stem from the potential for unauthorized network configuration changes, which could be leveraged in multi-stage attacks. For European organizations, especially those in manufacturing, utilities, and critical infrastructure sectors that heavily use Siemens automation products, this vulnerability poses a significant operational risk. Disruption of PLCs can cascade into broader system failures or safety incidents. The lack of authentication also raises concerns about insider threats or lateral movement by attackers within industrial networks. Given Siemens' strong market presence in Europe, the vulnerability could affect a large number of installations, increasing the potential for widespread impact if exploited.
Mitigation Recommendations
1. Siemens should prioritize releasing firmware updates or patches that implement proper authentication checks for critical functions, including network configuration changes. 2. Until patches are available, organizations must isolate affected PLCs on segmented, trusted networks with strict access controls to prevent unauthorized remote access. 3. Implement network monitoring and anomaly detection to identify unexpected changes in device IP addresses or unauthorized configuration attempts. 4. Use firewalls and access control lists (ACLs) to restrict communication to and from LOGO! devices only to authorized management stations. 5. Employ VPNs or secure tunnels for remote access to industrial control systems to reduce exposure to adjacent network attackers. 6. Conduct regular audits of device configurations and network topology to detect unauthorized modifications promptly. 7. Train operational technology (OT) personnel to recognize signs of network manipulation and enforce strong physical security to prevent local tampering. 8. Develop incident response plans specific to industrial control system disruptions to minimize downtime in case of exploitation.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-40816: CWE-306: Missing Authentication for Critical Function in Siemens LOGO! 12/24RCE
Description
A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA2) (All versions), LOGO! 12/24RCEo (6ED1052-2MD08-0BA2) (All versions), LOGO! 230RCE (6ED1052-1FB08-0BA2) (All versions), LOGO! 230RCEo (6ED1052-2FB08-0BA2) (All versions), LOGO! 24CE (6ED1052-1CC08-0BA2) (All versions), LOGO! 24CEo (6ED1052-2CC08-0BA2) (All versions), LOGO! 24RCE (6ED1052-1HB08-0BA2) (All versions), LOGO! 24RCEo (6ED1052-2HB08-0BA2) (All versions), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA2) (All versions), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA2) (All versions), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA2) (All versions), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA2) (All versions), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA2) (All versions), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA2) (All versions), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA2) (All versions), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA2) (All versions). Affected devices do not conduct certain validations when interacting with them. This could allow an unauthenticated remote attacker to manipulate the devices IP address, which means the device would not be reachable.
AI-Powered Analysis
Technical Analysis
CVE-2025-40816 identifies a critical security vulnerability in Siemens LOGO! 12/24RCE series programmable logic controllers (PLCs), including all versions of LOGO! 12/24RCE, LOGO! 230RCE, LOGO! 24CE, LOGO! 24RCE, and their SIPLUS variants. The root cause is a missing authentication mechanism for certain critical functions within the device firmware, specifically those that handle network configuration changes. This flaw allows an unauthenticated remote attacker to manipulate the device's IP address without any authentication or user interaction. The manipulation of the IP address can cause the device to become unreachable on the network, effectively resulting in a denial-of-service (DoS) condition. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), indicating that the device fails to verify the identity or permissions of entities requesting sensitive operations. The CVSS v3.1 base score is 7.6 (high severity), with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality (C:L), integrity (I:L), and availability (A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature and the critical role of these PLCs in industrial automation environments make it a significant threat. Siemens has not yet released patches, so affected organizations must rely on compensating controls. The vulnerability affects a broad range of Siemens LOGO! devices widely used in industrial control systems for small to medium automation tasks, including manufacturing, building automation, and infrastructure management.
Potential Impact
The primary impact of CVE-2025-40816 is on the availability of affected Siemens LOGO! PLC devices. By allowing unauthenticated remote attackers to change the device's IP address, the vulnerability can cause the device to become unreachable, disrupting industrial automation processes that rely on these controllers. This can lead to production downtime, safety risks, and operational inefficiencies. The limited confidentiality and integrity impacts stem from the potential for unauthorized network configuration changes, which could be leveraged in multi-stage attacks. For European organizations, especially those in manufacturing, utilities, and critical infrastructure sectors that heavily use Siemens automation products, this vulnerability poses a significant operational risk. Disruption of PLCs can cascade into broader system failures or safety incidents. The lack of authentication also raises concerns about insider threats or lateral movement by attackers within industrial networks. Given Siemens' strong market presence in Europe, the vulnerability could affect a large number of installations, increasing the potential for widespread impact if exploited.
Mitigation Recommendations
1. Siemens should prioritize releasing firmware updates or patches that implement proper authentication checks for critical functions, including network configuration changes. 2. Until patches are available, organizations must isolate affected PLCs on segmented, trusted networks with strict access controls to prevent unauthorized remote access. 3. Implement network monitoring and anomaly detection to identify unexpected changes in device IP addresses or unauthorized configuration attempts. 4. Use firewalls and access control lists (ACLs) to restrict communication to and from LOGO! devices only to authorized management stations. 5. Employ VPNs or secure tunnels for remote access to industrial control systems to reduce exposure to adjacent network attackers. 6. Conduct regular audits of device configurations and network topology to detect unauthorized modifications promptly. 7. Train operational technology (OT) personnel to recognize signs of network manipulation and enforce strong physical security to prevent local tampering. 8. Develop incident response plans specific to industrial control system disruptions to minimize downtime in case of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- siemens
- Date Reserved
- 2025-04-16T08:50:26.975Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6913a08bf4d5bbdab5b1c743
Added to database: 11/11/2025, 8:46:03 PM
Last enriched: 11/18/2025, 11:33:27 PM
Last updated: 1/7/2026, 4:17:53 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.