Siemens SICAM RTU Devices Denial-of-Service Vulnerability
Siemens SICAM RTU devices with SM-2558 extension ETA4 firmware (Revision_08 and earlier) and SM-2556 extension ETA2 firmware (Revision_11.01 and earlier) are vulnerable to denial-of-service attacks. An attacker can send a specially crafted network packet that causes the device to crash and become unresponsive. The vulnerability stems from insufficient input validation (CWE-400: Uncontrolled Resource Consumption). Affected products include SICAM AK SM-2558, SICAM TM 1703 SM-2558, SICAM BC 1703 SM-2558, SICAM AK 3 SM-2558, SICAM AK SM-2556, SICAM TM SM-2556, and SICAM BC SM-2556.
- Network access to the SICAM RTU device on the same network segment or across routed networks
- The vulnerable firmware versions must be running (Revision_08 or earlier for ETA4 modules; Revision_11.01 or earlier for ETA2 modules)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2c429f52-ffa7-4e38-ae30-303dadac0db3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.