Siemens Industrial Products DROWN Vulnerability (Update C)
The DROWN vulnerability affects multiple Siemens industrial network switches: SCALANCE X300, X414, X200 (including IRT and RNA variants), and ROX I. These devices support the SSLv2 encryption protocol, which is cryptographically broken. An attacker can downgrade TLS connections to SSLv2, decrypt previously captured traffic, or read secrets from the device. This affects secure management interfaces used to configure and monitor these network switches. No firmware updates are available from Siemens for any affected product line.
- Network access to TLS/SSL ports on the affected switch
- Ability to intercept network traffic or position as man-in-the-middle
- The switch must have SSLv2 enabled or supported
Patching may require device reboot — plan for process interruption
/api/v1/advisories/131fdf01-32d1-41b8-a144-89c755be0c78Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.