Siemens KTK, SIDOOR, SIMATIC, and SINAMICS (Update D)
A TCP stack vulnerability in affected Siemens PROFINET devices allows remote attackers to cause denial-of-service by sending specially crafted packets that force expensive computational operations for each incoming packet. The vulnerability affects the availability of devices running affected versions of SIMATIC S7 CPUs (all families), ET 200 I/O modules and controllers, SINAMICS drives with PROFINET, SIDOOR devices, KTK terminals, and related communication modules. The attacker does not need authentication or special configuration—only network access to the device's Ethernet port. Siemens has released firmware updates for some products (S7-1200, S7-1500, S7-410, ET 200SP Open Controller, ET 200eco PN variants) but many older products (S7-300, most ET 200 variants, SINAMICS control units, SIDOOR, KTK) will not receive fixes due to end-of-life status. As a workaround for S7-410 devices, disabling the CPU's built-in Ethernet port and using a separate communication module is recommended.
- Network access to the Ethernet port of the Siemens device (typically PROFINET port 502 or direct TCP access)
- Device must be reachable from the attacker's network segment
- No authentication or credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fec9f092-4938-4282-b630-64f769c04c6d