dnsmasq by Simon Kelley (Update A)
dnsmasq open-source DNS component versions before 2.83 contain three vulnerabilities (CVE-2020-25684 through CVE-2020-25686) that fail to properly validate DNS responses, allowing DNS spoofing attacks. The vulnerabilities affect Siemens RUGGEDCOM RM1224, SCALANCE M-800, SCALANCE S615, SCALANCE SC-600, and SCALANCE W1750D devices that rely on dnsmasq for DNS resolution. An attacker can send crafted DNS responses to redirect queries to malicious servers without needing credentials or user interaction. Siemens has released patches for most products (firmware 6.4 for RM1224/M-800/S615, 2.1.3 for SC-600) but states SCALANCE W1750D has no fix planned.
- Network access to Layer 2 network or upstream DNS path
- Ability to send crafted DNS responses before legitimate responses arrive
- dnsmasq service active and processing DNS queries
Patching may require device reboot — plan for process interruption
/api/v1/advisories/257b5a9a-32f0-4212-a159-c7b23ccd79fdGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.