Siemens PROFINET DCP (Update V)
Siemens PROFINET devices are vulnerable to denial of service attacks via specially crafted PROFINET DCP (Discovery and Configuration Protocol) Layer 2 packets. An attacker with access to the local Ethernet segment can send malformed DCP packets to cause affected devices to become unresponsive or crash. The vulnerability affects a wide range of Siemens industrial devices including PLCs (S7-1200, S7-1500, S7-300, S7-400), I/O modules (ET 200 series), network devices (SCALANCE switches), communication processors (CP modules), variable frequency drives (SINAMICS), and automation controllers. PROFIBUS interfaces are not affected.
- Direct Layer 2 network access to the local Ethernet segment where the device is connected
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/af62bcdb-74ab-4890-92b0-224b7e6718c7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.