ICSA-17-129-01 Siemens devices using the PROFINET Discovery and Configuration Protocol (Update K)
A vulnerability in the PROFINET Discovery and Configuration Protocol implementation in multiple Siemens products allows an attacker on the local network to send malformed packets that cause affected devices to stop responding or malfunction. The vulnerability stems from improper input validation (CWE-20) in PROFINET protocol handlers. Affected products include SIMATIC PCS 7, STEP 7 (TIA Portal and V5.X), WinCC (multiple versions), Primary Setup Tool, SIMATIC Automation Tool, SINUMERIK 808D Programming Tool, SINEMA Server, and other engineering and runtime tools. The impact is denial of service to automation and control functions. Most affected products have patches available; however, SIMATIC PCS 7 V8.1 and earlier, WinCC V7.2 and earlier, and several other end-of-life products have no remediation planned by Siemens.
- Attacker must be on the same local network segment (adjacent network) as the Siemens device
- PROFINET Discovery and Configuration Protocol (typically UDP port 34964) must be accessible from the attacker's position
- Device must be running one of the affected Siemens software or hardware products
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2f5e6eec-854f-41a0-a2a0-c5730dd8c712