Siemens SIMATIC S7-300 CPUs and SINUMERIK Controller over Profinet (Update A)
Multiple Siemens automation controllers are vulnerable to a denial-of-service attack via the PROFINET Engineering protocol (port 102/TCP). The vulnerability exists in SIMATIC S7-300 CPU family (all versions before 3.X.17), SIMATIC TDC CP51M1 (before v1.1.8), SIMATIC TDC CPU555 (before v1.1.1), and SINUMERIK 840D sl controllers (before v4.8.6 and v4.94 respectively). An attacker with network access to port 102 can send a malformed packet that causes the CPU to become unresponsive, preventing legitimate engineering communications and process control. No known public exploit exists; Siemens has released firmware updates for all affected products.
- Network access to port 102/TCP (PROFINET Engineering) on the controller
- Ability to send crafted packets to the affected device (network routing path must exist)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/dd73547e-55df-4a50-88fc-ddf769540507Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.