Siemens PROFINET-IO Stack (Update H)
A denial of service vulnerability exists in Siemens PROFINET-IO stack versions prior to v6.0 when multiple legitimate diagnostic requests are sent to the DCE-RPC interface. An attacker can send crafted packets to port 34964/UDP, exhausting device resources and causing the device to stop responding. The vulnerability affects a broad range of industrial network devices including SCALANCE switches, SIMATIC control interfaces, ET200 series modules, and SIMOTION motion controllers. Service is restored only by manual device reboot or intervention. Siemens has released firmware updates for most affected product families; however, some older products including CP 343-1 series, ET200ecoPN, ET200S, and RF180/182C have no fix planned.
- Network access to affected device on port 34964/UDP
- PROFINET stack enabled on the device (default)
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b4881f2c-e413-4510-8f9a-50218bec16ce