SIMATIC S7-1200 CPU V1/V2 <V2.0.2 CaptureReplay Vulnerability
CVE-2011-20002 Published on October 14, 2025

A vulnerability has been identified in SIMATIC S7-1200 CPU V1 family (incl. SIPLUS variants) (All versions < V2.0.2), SIMATIC S7-1200 CPU V2 family (incl. SIPLUS variants) (All versions < V2.0.2). Affected controllers are vulnerable to capture-replay in the communication with the engineering software. This could allow an on-path attacker between the engineering software and the controller to execute any previously recorded commands at a later time (e.g. set the controller to STOP), regardless whether or not the controller had a password configured.

NVD

Weakness Type

Authentication Bypass by Capture-replay

A capture-replay flaw exists when the design of the software makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes). Capture-replay attacks are common and can be difficult to defeat without cryptography. They are a subset of network injection attacks that rely on observing previously-sent valid commands, then changing them slightly if necessary and resending the same commands to the server.


Products Associated with CVE-2011-20002

stack.watch emails you whenever new vulnerabilities are published in Siemens Simatic or Siemens Siplus. Just hit a watch button to start following.

 
 

Affected Versions

Siemens SIMATIC S7-1200 CPU V1 family (incl. SIPLUS variants): Siemens SIMATIC S7-1200 CPU V2 family (incl. SIPLUS variants):

Exploit Probability

EPSS
0.08%
Percentile
22.42%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.