Siemens Industrial Products with OPC UA (Update H)
Denial-of-service vulnerability in OPC UA implementations across multiple Siemens industrial products. A remote attacker can send a specially crafted OPC UA request to crash the OPC UA service on affected devices. The vulnerability affects controllers (S7-1500, ET 200SP), HMI panels (Comfort, KTP Mobile), CNC systems (SINUMERIK), supervisory software (WinCC OA, WinCC Runtime Advanced), networking products (SINEMA Server, SINEC NMS), and I/O devices (RF188C, RF600R). SIMATIC CP 443-1 OPC UA, SIMATIC NET PC Software V13 and V15 have no vendor fix available. Successful exploitation disrupts communications between control system components.
- Network access to OPC UA service port (typically 4840 or custom port)
- OPC UA service enabled on the device
- No authentication required to trigger the denial-of-service condition
Patching may require device reboot — plan for process interruption
/api/v1/advisories/eb390484-f84a-4244-9c50-128084ed278cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.