Siemens Industrial Products (Update S)
Multiple Siemens industrial products with PROFINET connectivity are vulnerable to remote denial of service via specially crafted packets sent to port 161/UDP (SNMP). The vulnerability affects development kits, I/O modules (ET 200 series), PLCs (S7 series), motion controllers (SIMOTION), variable frequency drives (SINAMICS), and other networked industrial devices. Affected versions of these products do not properly validate or handle SNMP packets, allowing an attacker to crash or cause extended unavailability of the device. Siemens has released firmware updates for many products but states that some device families will not receive patches.
- Network access to UDP port 161 on the affected device (internal plant network or externally if device is internet-reachable)
- No authentication required
- Default SNMP configuration or SNMP enabled on the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fac5829a-d456-487d-8459-e54ae3eb1b52Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.