Siemens ICS Patch Tuesday: 18 Advisories Address Critical Vulnerabilities in Industrial Systems

Siemens Patches Critical Flaws in SIMATIC S7 PLCs, RUGGEDCOM Devices

CRITICAL
May 13, 2026
4m read
Industrial Control SystemsVulnerabilityPatch Management

Related Entities

Organizations

Siemens Palo Alto Networks

Products & Tech

SIMATIC S7RUGGEDCOMSENTRONOpcenterSimcenterTeamcenter

CVE Identifiers

CVE-2026-25786
CRITICAL
CVSS:9.3
CVE-2026-25787
CRITICAL
CVSS:9.3
CVE-2026-25789
HIGH
CVSS:7.2

Full Report

Executive Summary

Siemens has released a significant batch of security updates for its industrial products as part of the May 2026 ICS Patch Tuesday. The 18 new advisories address a multitude of vulnerabilities, several of which are rated critical and could allow for remote code execution (RCE), device takeover, or denial of service in Operational Technology (OT) environments. The most notable flaws affect the ubiquitous SIMATIC S7 series of Programmable Logic Controllers (PLCs) and RUGGEDCOM networking devices. Given the criticality of these systems in manufacturing, energy, and other infrastructure sectors, asset owners are urged to review the advisories and apply mitigations immediately.

Vulnerability Details

This month's advisories cover a wide range of products and vulnerability types. The most critical include:

  • CVE-2026-25786 & CVE-2026-25787 - SIMATIC S7 PLC XSS (CVSS 9.3): Two critical Cross-Site Scripting vulnerabilities in the web servers of SIMATIC S7-1200 and S7-1500 PLCs. An authenticated attacker could inject malicious scripts by manipulating station or object names. In an OT context, this could be used to steal an engineer's session credentials or trick them into performing malicious actions on the PLC.

  • CVE-2026-25789 - SIMATIC S7 PLC XSS (CVSS 7.2): Another XSS flaw, this one affecting the firmware update page. It could be exploited via social engineering to compromise the integrity of the firmware update process.

  • RUGGEDCOM ROX Vulnerabilities: Multiple flaws were patched in RUGGEDCOM ROX devices, including some that could allow an attacker to execute commands with root privileges.

  • SENTRON 7KT PAC1261 Flaw: A vulnerability that could lead to a complete takeover of the device.

  • Third-Party Component Vulnerabilities: Siemens also addressed hundreds of vulnerabilities in third-party components used in products like SIMATIC CN4100. Additionally, they confirmed that the RUGGEDCOM APE1808 product is affected by the recently disclosed PAN-OS vulnerability, highlighting supply chain risks.

Affected Systems

A partial list of affected product families includes:

  • SIMATIC S7-1200, S7-1500 PLCs
  • RUGGEDCOM ROX, APE1808
  • SENTRON 7KT PAC1261 Data Manager
  • ROS#
  • SIMATIC CN4100
  • Opcenter RDnL
  • Simcenter Femap
  • Teamcenter

Asset owners must consult the specific Siemens advisories for a complete list of affected products, versions, and patch availability.

Impact Assessment

Vulnerabilities in core industrial components like Siemens PLCs and networking gear pose a direct threat to safety and operational continuity. Successful exploitation of these flaws could lead to:

  • Loss of View/Control: An attacker could disrupt an operator's ability to monitor or control an industrial process.
  • Process Manipulation: An attacker could alter PLC logic to shut down a process, damage equipment, or create an unsafe physical state.
  • Intellectual Property Theft: Compromise of engineering workstations or data historians could lead to the theft of proprietary process formulas or designs.
  • Pivot to other networks: Compromised OT network devices can be used to pivot deeper into the OT environment or back into the IT network.

Detection Methods

  • Network Traffic Analysis: Use an ICS-aware NIDS to monitor for suspicious traffic to PLC web servers on ports 80/443. Look for long, unusual strings in URL parameters that might indicate XSS injection attempts. This is an application of D3FEND's Network Traffic Analysis (D3-NTA).
  • Asset Inventory: Use discovery tools to identify all vulnerable Siemens devices and versions in your environment. This is the first step toward remediation.
  • Log Analysis: Monitor web server access logs on PLCs and other devices for anomalous requests, especially to pages related to firmware updates or configuration.

Remediation Steps

  1. Review Siemens Advisories: The first step is to visit the Siemens ProductCERT website and identify which of the 18 new advisories apply to your environment.
  2. Apply Patches: For each affected product, download and apply the recommended firmware or software updates. This should be done in a planned maintenance window after testing the patch in a non-production environment if possible.
  3. Implement Workarounds: If patching is not immediately possible, Siemens often provides mitigation guidance. For the XSS flaws, this includes:
    • Restricting access to the integrated web server.
    • Ensuring that only trusted users have network access to the devices.
    • Hardening the configuration of the web server.
  4. Network Segmentation: As a general best practice, ensure that PLCs and other critical control system components are on a properly segmented network, isolated from corporate IT networks and the internet. Access should be restricted through a firewall or DMZ. This is a key D3FEND hardening technique: Network Isolation (D3-NI).

Timeline of Events

1
May 13, 2026
Siemens releases 18 new security advisories for its industrial products.
2
May 13, 2026
This article was published

MITRE ATT&CK Mitigations

Applying the firmware and software updates provided by Siemens is the most direct way to remediate these vulnerabilities.

Isolating critical control systems from general-purpose IT networks is a fundamental and crucial mitigation for protecting OT environments.

Restricting network access to the web servers on PLCs to only authorized engineering workstations and users.

Timeline of Events

1
May 13, 2026

Siemens releases 18 new security advisories for its industrial products.

Sources & References

Critical-Severity XSS Flaws Uncovered in Siemens SIMATIC S7 Web Servers
Daily Cybersecurity (dailycybersecurity.com) May 13, 2026
Latest Siemens Vulnerabilities
Feedly (feedly.com) May 13, 2026
Several Vulnerabilities Found in Siemens SIMATIC S7 PLCs
SecurityWeek (securityweek.com) May 13, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ICSOTPLCSCADAvulnerabilityXSSPatch Tuesday

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.