Siemens 7KM PAC Switched Ethernet
Monitor4.3ICS-CERT ICSA-17-243-03Aug 31, 2017
Attack VectorAdjacent
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
The 7KM PAC Switched Ethernet PROFINET expansion module contains a denial-of-service vulnerability that allows a remote attacker on the same network segment to crash the device by sending crafted packets. This results in loss of communication and disruption of power monitoring and control functions. The vulnerability affects all firmware versions prior to V2.1.3 and requires only the ability to send network traffic to the module—no credentials or authentication is needed.
What this means
What could happen
A remote attacker on the same network segment could crash the 7KM PAC module, causing loss of communication and potentially stopping power monitoring and control functions that depend on this device.
Who's at risk
Water utilities and electric utilities that use Siemens 7KM PAC power monitoring and control modules with PROFINET networking. This affects facilities that rely on these devices for real-time electrical parameter monitoring and demand response control.
How it could be exploited
An attacker with network access to the PROFINET segment can send crafted packets to the 7KM PAC module, triggering a denial-of-service condition. The attack requires only the ability to send network traffic to the device's IP address on the local network—no credentials or complex setup needed.
Prerequisites
- Network access to PROFINET segment where the 7KM PAC module is deployed
- No authentication or credentials required
- Attacker can transmit packets to the module's network interface
remotely exploitableno authentication requiredlow complexity attackaffects monitoring and control infrastructure
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
7KM PAC Switched Ethernet PROFINET expansion module: All< 2.1.3V2.1.3
Remediation & Mitigation
0/4
Do now
0/2HARDENINGImplement network segmentation to restrict PROFINET traffic only to authorized engineering and control systems
WORKAROUNDDeploy firewall rules to limit access to the PROFINET network segment from untrusted sources
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate 7KM PAC Switched Ethernet PROFINET expansion module firmware to Version V2.1.3 or later
Long-term hardening
0/1HARDENINGUse VPN or other encryption mechanisms to protect communication to and from the 7KM PAC module if remote access is required
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/571bdc88-45a8-4bc2-8d01-1c8f526dce64