Siemens SCALANCE W1750D, M800, S615, and RUGGEDCOM RM1224 (Update C)
Multiple Siemens industrial networking devices contain buffer overflow and integer underflow vulnerabilities in DNS proxy functionality. Affected products are SCALANCE W1750D wireless controller, SCALANCE M-800 and S615 industrial Ethernet switches, and RUGGEDCOM RM1224 wireless access point. The vulnerabilities exist in versions prior to v5.0 (M800/S615/RM1224) and v6.5.1.5 (W1750D). Remote attackers can send crafted DNS packets to port 53/UDP to trigger the vulnerabilities, potentially leading to code execution, authentication bypass, or denial of service.
- Network access to affected device on port 53/UDP
- Device running vulnerable firmware version (before 5.0 for M800/S615/RM1224, before 6.5.1.5 for W1750D)
- DNS proxy functionality enabled on the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8ff8ce9b-ff81-4600-a0a5-bd2cc1cf8a4eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.