Siemens SCALANCE and SIMATIC (Update H)
A vulnerability in the TCP stack of Siemens SCALANCE switches and SIMATIC communication processors can be exploited by remote attackers to trigger expensive computation on every incoming packet. This causes denial of service by exhausting device CPU resources and rendering the device unable to forward traffic or process commands. The vulnerability affects multiple SCALANCE switch families (X-200IRT, XF-200, X-200, X-300, XR-300 series) and SIMATIC communication processors (CP 442-1 RNA, CP 443-1 variants). Several products have no updates available and require migration or network-based mitigation.
- Network-layer access to the device (direct connection to the same subnet or routed path through your network)
- No credentials or authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f68b2f66-0c63-420c-b592-14f491e9225cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.