Siemens SIMOTICS, Desigo, APOGEE, and TALON
SIMOTICS CONNECT 400, Desigo PowerPC-based controllers, APOGEE MEC/MBC/PXC, and TALON TC products contain a vulnerability in the DHCP client implementation (Mentor Nucleus Networking Module). The flaw allows improper input validation of DHCP responses, causing affected devices to become unresponsive or reboot. This impacts facility control systems that rely on these controllers for building automation, HVAC, and process management. Siemens has released firmware updates for most products; static IP configuration is available as an interim workaround. Products using P2 Ethernet protocol prior to version 2.8.2 have no patch available from the vendor.
- Network access to the local network segment (ARP/Layer 2 reachable, not necessarily routed)
- DHCP client enabled on the device (note: disabled by default on most products except some P2 versions)
- Device must be attempting DHCP address assignment or renewal
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3cf7e660-1b51-4b72-84f8-c1da290f17cdGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.