Siemens has released a significant batch of security updates for its industrial products as part of the May 2026 ICS Patch Tuesday. The 18 new advisories address a multitude of vulnerabilities, several of which are rated critical and could allow for remote code execution (RCE), device takeover, or denial of service in Operational Technology (OT) environments. The most notable flaws affect the ubiquitous SIMATIC S7 series of Programmable Logic Controllers (PLCs) and RUGGEDCOM networking devices. Given the criticality of these systems in manufacturing, energy, and other infrastructure sectors, asset owners are urged to review the advisories and apply mitigations immediately.
This month's advisories cover a wide range of products and vulnerability types. The most critical include:
CVE-2026-25786 & CVE-2026-25787 - SIMATIC S7 PLC XSS (CVSS 9.3): Two critical Cross-Site Scripting vulnerabilities in the web servers of SIMATIC S7-1200 and S7-1500 PLCs. An authenticated attacker could inject malicious scripts by manipulating station or object names. In an OT context, this could be used to steal an engineer's session credentials or trick them into performing malicious actions on the PLC.
CVE-2026-25789 - SIMATIC S7 PLC XSS (CVSS 7.2): Another XSS flaw, this one affecting the firmware update page. It could be exploited via social engineering to compromise the integrity of the firmware update process.
RUGGEDCOM ROX Vulnerabilities: Multiple flaws were patched in RUGGEDCOM ROX devices, including some that could allow an attacker to execute commands with root privileges.
SENTRON 7KT PAC1261 Flaw: A vulnerability that could lead to a complete takeover of the device.
Third-Party Component Vulnerabilities: Siemens also addressed hundreds of vulnerabilities in third-party components used in products like SIMATIC CN4100. Additionally, they confirmed that the RUGGEDCOM APE1808 product is affected by the recently disclosed PAN-OS vulnerability, highlighting supply chain risks.
A partial list of affected product families includes:
Asset owners must consult the specific Siemens advisories for a complete list of affected products, versions, and patch availability.
Vulnerabilities in core industrial components like Siemens PLCs and networking gear pose a direct threat to safety and operational continuity. Successful exploitation of these flaws could lead to:
Network Traffic Analysis (D3-NTA).Network Isolation (D3-NI).Applying the firmware and software updates provided by Siemens is the most direct way to remediate these vulnerabilities.
Isolating critical control systems from general-purpose IT networks is a fundamental and crucial mitigation for protecting OT environments.
Restricting network access to the web servers on PLCs to only authorized engineering workstations and users.
Siemens releases 18 new security advisories for its industrial products.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.