Siemens TIM 3V-IE and 4R-IE Family Devices
Siemens TIM 3V-IE and TIM 4R-IE telecom interface modules contain an improper input validation vulnerability (CWE-489) in versions prior to 2.8 (or 3.3 for DNP3 variants). The vulnerability allows an unauthenticated remote attacker to send malformed packets to UDP port 17185, potentially leading to code execution on the device. These modules are commonly deployed in substations and remote sites for SCADA communications. Siemens has released firmware updates that address the issue and recommends immediate patching. Interim mitigations include firewall rules to restrict access to port 17185/UDP and changing the default IP address of affected devices.
- Network access to port 17185/UDP on the affected device
- Device running vulnerable firmware version (TIM 3V-IE/Advanced/4R-IE below v2.8, or DNP3 variants below v3.3)
- Device must be reachable on the network from attacker's location
Patching may require device reboot — plan for process interruption
/api/v1/advisories/afa93182-5d09-4823-999a-9e68a15003e2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.