CVE-2025-40944: CWE-400: Uncontrolled Resource Consumption in Siemens SIMATIC ET 200AL IM 157-1 PN
A vulnerability has been identified in SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0) (All versions), SIMATIC ET 200MP IM 155-5 PN HF (6ES7155-5AA00-0AC0) (All versions >= V4.2.0), SIMATIC ET 200SP IM 155-6 MF HF (6ES7155-6MU00-0CN0) (All versions), SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants) (All versions < V1.3), SIMATIC ET 200SP IM 155-6 PN R1 (6ES7155-6AU00-0HM0) (All versions < V6.0.1), SIMATIC ET 200SP IM 155-6 PN/2 HF (6ES7155-6AU01-0CN0) (All versions >= V4.2.0), SIMATIC ET 200SP IM 155-6 PN/3 HF (6ES7155-6AU30-0CN0) (All versions < V4.2.2), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0) (All versions), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0) (All versions < V6.0.0), SIPLUS ET 200MP IM 155-5 PN HF (6AG1155-5AA00-2AC0) (All versions >= V4.2.0), SIPLUS ET 200MP IM 155-5 PN HF (6AG1155-5AA00-7AC0) (All versions >= V4.2.0), SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL (6AG2155-5AA00-1AC0) (All versions >= V4.2.0), SIPLUS ET 200SP IM 155-6 PN HF (6AG1155-6AU01-2CN0) (All versions >= V4.2.0), SIPLUS ET 200SP IM 155-6 PN HF (6AG1155-6AU01-7CN0) (All versions >= V4.2.0), SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL (6AG2155-6AU01-1CN0) (All versions >= V4.2.0), SIPLUS ET 200SP IM 155-6 PN HF TX RAIL (6AG2155-6AU01-4CN0) (All versions >= V4.2.0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0) (All versions < V6.0.0). Affected devices do not properly handle S7 protocol session disconnect requests. When receiving a valid S7 protocol Disconnect Request (COTP DR TPDU) on TCP port 102, the devices enter an improper session state. This could allow an attacker to cause the device to become unresponsive, leading to a denial-of-service condition that requires a power cycle to restore normal operation.
AI Analysis
Technical Summary
CVE-2025-40944 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in multiple Siemens SIMATIC ET 200 series communication modules, including ET 200AL IM 157-1 PN, ET 200MP IM 155-5 PN HF, ET 200SP IM 155-6 variants, and SIPLUS versions. The root cause is improper handling of valid S7 protocol Disconnect Requests (COTP DR TPDU) received on TCP port 102, the standard port for Siemens S7 communication. When these devices receive such a disconnect request, they enter an improper session state that leads to resource exhaustion. This state causes the device to become unresponsive, effectively resulting in a denial-of-service condition. Recovery from this state requires a manual power cycle, which disrupts industrial processes relying on these devices. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS v3.1 score is 7.5 (high severity), reflecting the network attack vector, no privileges required, no user interaction, and a high impact on availability. The vulnerability affects all versions of some devices and specific version ranges of others, indicating a widespread exposure across Siemens’ industrial communication product line. No patches or exploits are currently publicly available, but the broad impact on critical ICS components makes this a significant concern for operational technology (OT) environments.
Potential Impact
The primary impact of CVE-2025-40944 is a denial-of-service condition that disrupts the availability of Siemens SIMATIC ET 200 series modules, which are integral components in industrial automation and control systems. For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors, this can lead to operational downtime, production losses, safety risks, and potential cascading failures in automated processes. Since these devices often operate in safety-critical environments, unplanned outages could also pose risks to personnel and equipment. The requirement for a manual power cycle to restore functionality means that automated recovery is not possible, increasing incident response complexity and downtime. The vulnerability’s ease of exploitation over the network without authentication elevates the risk of targeted attacks or opportunistic scanning by threat actors. Given Siemens’ strong market presence in Europe, the impact could be widespread, affecting both large industrial enterprises and smaller operators relying on these devices.
Mitigation Recommendations
1. Monitor Siemens’ official channels for firmware updates addressing CVE-2025-40944 and apply patches promptly once available. 2. Implement strict network segmentation to isolate industrial control networks from corporate and external networks, limiting access to TCP port 102. 3. Deploy access control lists (ACLs) and firewall rules to restrict inbound traffic to only trusted management stations and authorized devices. 4. Use deep packet inspection (DPI) or protocol-aware intrusion detection/prevention systems (IDS/IPS) to detect and block anomalous or malformed S7 Disconnect Requests. 5. Conduct regular network traffic monitoring and anomaly detection focused on S7 protocol communications to identify potential exploitation attempts early. 6. Establish operational procedures for rapid response and manual power cycling of affected devices to minimize downtime. 7. Train OT security teams on this vulnerability and ensure incident response plans include scenarios for DoS conditions affecting Siemens ET 200 modules. 8. Consider deploying redundant or failover systems where possible to maintain operational continuity during device outages.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-40944: CWE-400: Uncontrolled Resource Consumption in Siemens SIMATIC ET 200AL IM 157-1 PN
Description
A vulnerability has been identified in SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0) (All versions), SIMATIC ET 200MP IM 155-5 PN HF (6ES7155-5AA00-0AC0) (All versions >= V4.2.0), SIMATIC ET 200SP IM 155-6 MF HF (6ES7155-6MU00-0CN0) (All versions), SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants) (All versions < V1.3), SIMATIC ET 200SP IM 155-6 PN R1 (6ES7155-6AU00-0HM0) (All versions < V6.0.1), SIMATIC ET 200SP IM 155-6 PN/2 HF (6ES7155-6AU01-0CN0) (All versions >= V4.2.0), SIMATIC ET 200SP IM 155-6 PN/3 HF (6ES7155-6AU30-0CN0) (All versions < V4.2.2), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0) (All versions), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0) (All versions < V6.0.0), SIPLUS ET 200MP IM 155-5 PN HF (6AG1155-5AA00-2AC0) (All versions >= V4.2.0), SIPLUS ET 200MP IM 155-5 PN HF (6AG1155-5AA00-7AC0) (All versions >= V4.2.0), SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL (6AG2155-5AA00-1AC0) (All versions >= V4.2.0), SIPLUS ET 200SP IM 155-6 PN HF (6AG1155-6AU01-2CN0) (All versions >= V4.2.0), SIPLUS ET 200SP IM 155-6 PN HF (6AG1155-6AU01-7CN0) (All versions >= V4.2.0), SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL (6AG2155-6AU01-1CN0) (All versions >= V4.2.0), SIPLUS ET 200SP IM 155-6 PN HF TX RAIL (6AG2155-6AU01-4CN0) (All versions >= V4.2.0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0) (All versions < V6.0.0). Affected devices do not properly handle S7 protocol session disconnect requests. When receiving a valid S7 protocol Disconnect Request (COTP DR TPDU) on TCP port 102, the devices enter an improper session state. This could allow an attacker to cause the device to become unresponsive, leading to a denial-of-service condition that requires a power cycle to restore normal operation.
AI-Powered Analysis
Technical Analysis
CVE-2025-40944 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in multiple Siemens SIMATIC ET 200 series communication modules, including ET 200AL IM 157-1 PN, ET 200MP IM 155-5 PN HF, ET 200SP IM 155-6 variants, and SIPLUS versions. The root cause is improper handling of valid S7 protocol Disconnect Requests (COTP DR TPDU) received on TCP port 102, the standard port for Siemens S7 communication. When these devices receive such a disconnect request, they enter an improper session state that leads to resource exhaustion. This state causes the device to become unresponsive, effectively resulting in a denial-of-service condition. Recovery from this state requires a manual power cycle, which disrupts industrial processes relying on these devices. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS v3.1 score is 7.5 (high severity), reflecting the network attack vector, no privileges required, no user interaction, and a high impact on availability. The vulnerability affects all versions of some devices and specific version ranges of others, indicating a widespread exposure across Siemens’ industrial communication product line. No patches or exploits are currently publicly available, but the broad impact on critical ICS components makes this a significant concern for operational technology (OT) environments.
Potential Impact
The primary impact of CVE-2025-40944 is a denial-of-service condition that disrupts the availability of Siemens SIMATIC ET 200 series modules, which are integral components in industrial automation and control systems. For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors, this can lead to operational downtime, production losses, safety risks, and potential cascading failures in automated processes. Since these devices often operate in safety-critical environments, unplanned outages could also pose risks to personnel and equipment. The requirement for a manual power cycle to restore functionality means that automated recovery is not possible, increasing incident response complexity and downtime. The vulnerability’s ease of exploitation over the network without authentication elevates the risk of targeted attacks or opportunistic scanning by threat actors. Given Siemens’ strong market presence in Europe, the impact could be widespread, affecting both large industrial enterprises and smaller operators relying on these devices.
Mitigation Recommendations
1. Monitor Siemens’ official channels for firmware updates addressing CVE-2025-40944 and apply patches promptly once available. 2. Implement strict network segmentation to isolate industrial control networks from corporate and external networks, limiting access to TCP port 102. 3. Deploy access control lists (ACLs) and firewall rules to restrict inbound traffic to only trusted management stations and authorized devices. 4. Use deep packet inspection (DPI) or protocol-aware intrusion detection/prevention systems (IDS/IPS) to detect and block anomalous or malformed S7 Disconnect Requests. 5. Conduct regular network traffic monitoring and anomaly detection focused on S7 protocol communications to identify potential exploitation attempts early. 6. Establish operational procedures for rapid response and manual power cycling of affected devices to minimize downtime. 7. Train OT security teams on this vulnerability and ensure incident response plans include scenarios for DoS conditions affecting Siemens ET 200 modules. 8. Consider deploying redundant or failover systems where possible to maintain operational continuity during device outages.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- siemens
- Date Reserved
- 2025-04-16T09:06:15.879Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696616cfa60475309f9ce613
Added to database: 1/13/2026, 9:56:31 AM
Last enriched: 1/13/2026, 10:11:08 AM
Last updated: 2/7/2026, 8:55:48 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2111: Path Traversal in JeecgBoot
MediumCVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.