SIPLUS LOGO! Time Sync Manipulation (Unauth Remote)
CVE-2025-40817 Published on November 11, 2025

A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA2) (All versions), LOGO! 12/24RCEo (6ED1052-2MD08-0BA2) (All versions), LOGO! 230RCE (6ED1052-1FB08-0BA2) (All versions), LOGO! 230RCEo (6ED1052-2FB08-0BA2) (All versions), LOGO! 24CE (6ED1052-1CC08-0BA2) (All versions), LOGO! 24CEo (6ED1052-2CC08-0BA2) (All versions), LOGO! 24RCE (6ED1052-1HB08-0BA2) (All versions), LOGO! 24RCEo (6ED1052-2HB08-0BA2) (All versions), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA2) (All versions), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA2) (All versions), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA2) (All versions), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA2) (All versions), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA2) (All versions), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA2) (All versions), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA2) (All versions), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA2) (All versions). Affected devices do not conduct certain validations when interacting with them. This could allow an unauthenticated remote attacker to change time of the device, which means the device could behave differently.

NVD

Weakness Type

Missing Authentication for Critical Function

The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.


Products Associated with CVE-2025-40817

Want to know whenever a new CVE is published for Siemens Logo? stack.watch will email you.

 

Affected Versions

Siemens LOGO! 12/24RCE: Siemens LOGO! 12/24RCEo: Siemens LOGO! 230RCE: Siemens LOGO! 230RCEo: Siemens LOGO! 24CE: Siemens LOGO! 24CEo: Siemens LOGO! 24RCE: Siemens LOGO! 24RCEo: Siemens SIPLUS LOGO! 12/24RCE: Siemens SIPLUS LOGO! 12/24RCEo: Siemens SIPLUS LOGO! 230RCE: Siemens SIPLUS LOGO! 230RCEo: Siemens SIPLUS LOGO! 24CE: Siemens SIPLUS LOGO! 24CEo: Siemens SIPLUS LOGO! 24RCE: Siemens SIPLUS LOGO! 24RCEo:

Exploit Probability

EPSS
0.04%
Percentile
10.83%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.