Siemens Sinumerik 840d Sl
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Siemens Sinumerik 840d Sl.
By the Year
In 2026 there have been 0 vulnerabilities in Siemens Sinumerik 840d Sl. Last year, in 2025 Sinumerik 840d Sl had 1 security vulnerability published. Right now, Sinumerik 840d Sl is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 1 | 7.50 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 0 | 0.00 |
| 2021 | 0 | 0.00 |
| 2020 | 1 | 0.00 |
| 2019 | 2 | 7.50 |
It may take a day or so for new Sinumerik 840d Sl vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Siemens Sinumerik 840d Sl Security Vulnerabilities
TCP SeQ Validation Flaw Enables Remote DoS in TCP Services
CVE-2025-40820
7.5 - High
- December 09, 2025
Affected products do not properly enforce TCP sequence number validation in specific scenarios but accept values within a broad range. This could allow an unauthenticated remote attacker e.g. to interfere with connection setup, potentially leading to a denial of service. The attack succeeds only if an attacker can inject IP packets with spoofed addresses at precisely timed moments, and it affects only TCP-based services.
Improper Verification of Source of a Communication Channel
A vulnerability has been identified in SIMATIC S7-300 CPU family (incl
CVE-2019-18336
- March 10, 2020
A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V3.X.17), SIMATIC TDC CP51M1 (All versions < V1.1.8), SIMATIC TDC CPU555 (All versions < V1.1.1), SINUMERIK 840D sl (All versions < V4.8.6), SINUMERIK 840D sl (All versions < V4.94). Specially crafted packets sent to port 102/tcp (Profinet) could cause the affected device to go into defect mode. A restart is required in order to recover the system. Successful exploitation requires an attacker to have network access to port 102/tcp, with no authentication. No user interation is required. At the time of advisory publication no public exploitation of this security vulnerability was known.
Resource Exhaustion
An attacker with network access to an affected product may cause a denial of service condition by breaking the real-time synchronization (IRT) of the affected installation.
CVE-2019-10923
7.5 - High
- October 10, 2019
An attacker with network access to an affected product may cause a denial of service condition by breaking the real-time synchronization (IRT) of the affected installation.
Resource Exhaustion
Affected devices improperly handle large amounts of specially crafted UDP packets
CVE-2019-10936
7.5 - High
- October 10, 2019
Affected devices improperly handle large amounts of specially crafted UDP packets. This could allow an unauthenticated remote attacker to trigger a denial of service condition.
Resource Exhaustion
Specially crafted packets sent to port 161/udp could cause a denial of service condition
CVE-2017-12741
7.5 - High
- December 26, 2017
Specially crafted packets sent to port 161/udp could cause a denial of service condition. The affected devices must be restarted manually.
Resource Exhaustion
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Siemens Sinumerik 840d Sl or by Siemens? Click the Watch button to subscribe.