Insufficiently protected credentials in Siemens SIMATIC S7-1200 and S7-1500 CPU Families

Published: 2022-10-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-38465
Exploitation vector Local
Public exploit N/A
Vulnerable software
SIMATIC ET 200SP Open Controller CPU 1515SP PC
Hardware solutions / Other hardware appliances

SIMATIC Drive Controller
Hardware solutions / Firmware

SIMATIC S7-1200 CPU family
Hardware solutions / Firmware

Hardware solutions / Firmware

SIMATIC ET 200SP Open Controller CPU 1515SP PC2
Server applications / SCADA systems

SIMATIC S7-1500 Software Controller
Server applications / SCADA systems

Server applications / SCADA systems

Vendor Siemens

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Insufficiently protected credentials

EUVDB-ID: #VU68263

Risk: Low


CVE-ID: CVE-2022-38465

CWE-ID: CWE-522 - Insufficiently Protected Credentials

Exploit availability: No


The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to insufficiently protected credentials. A local attacker can discover the private key of a CPU product family and extract confidential configuration data from projects that are protected by that key or perform attacks against legacy PG/PC and HMI communication.


Install updates from vendor's website.

Vulnerable software versions

SIMATIC ET 200SP Open Controller CPU 1515SP PC: All versions

SIMATIC Drive Controller: before 2.9.2

SIMATIC ET 200SP Open Controller CPU 1515SP PC2: before 21.9

SIMATIC S7-1200 CPU family: before 4.5.0

SIMATIC S7-1500 CPU: before 2.9.2

SIMATIC S7-1500 Software Controller: before 21.9

SIMATIC S7-PLCSIM Advanced: before 4.0

CPE2.3 External links

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?