LOGO! Unauth Remote IP Config Manipulation (DoS)
CVE-2025-40816 Published on November 11, 2025

A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA2) (All versions), LOGO! 12/24RCEo (6ED1052-2MD08-0BA2) (All versions), LOGO! 230RCE (6ED1052-1FB08-0BA2) (All versions), LOGO! 230RCEo (6ED1052-2FB08-0BA2) (All versions), LOGO! 24CE (6ED1052-1CC08-0BA2) (All versions), LOGO! 24CEo (6ED1052-2CC08-0BA2) (All versions), LOGO! 24RCE (6ED1052-1HB08-0BA2) (All versions), LOGO! 24RCEo (6ED1052-2HB08-0BA2) (All versions), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA2) (All versions), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA2) (All versions), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA2) (All versions), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA2) (All versions), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA2) (All versions), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA2) (All versions), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA2) (All versions), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA2) (All versions). Affected devices do not conduct certain validations when interacting with them. This could allow an unauthenticated remote attacker to manipulate the devices IP address, which means the device would not be reachable.

NVD

Weakness Type

Missing Authentication for Critical Function

The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.


Products Associated with CVE-2025-40816

Want to know whenever a new CVE is published for Siemens Logo? stack.watch will email you.

 

Affected Versions

Siemens LOGO! 12/24RCE: Siemens LOGO! 12/24RCEo: Siemens LOGO! 230RCE: Siemens LOGO! 230RCEo: Siemens LOGO! 24CE: Siemens LOGO! 24CEo: Siemens LOGO! 24RCE: Siemens LOGO! 24RCEo: Siemens SIPLUS LOGO! 12/24RCE: Siemens SIPLUS LOGO! 12/24RCEo: Siemens SIPLUS LOGO! 230RCE: Siemens SIPLUS LOGO! 230RCEo: Siemens SIPLUS LOGO! 24CE: Siemens SIPLUS LOGO! 24CEo: Siemens SIPLUS LOGO! 24RCE: Siemens SIPLUS LOGO! 24RCEo:

Exploit Probability

EPSS
0.06%
Percentile
18.84%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.