Siemens SCALANCE and RUGGEDCOM Devices SSH (Update A)
A vulnerability in the SSH authentication implementation of SCALANCE and RUGGEDCOM network devices allows an attacker to cause a denial of service by sending a specially crafted SSH authentication request. When the device processes the malformed request, the SSH service crashes and the device becomes unresponsive. This affects RUGGEDCOM RM1224 V6.3, SCALANCE M-800 V6.3, SCALANCE S615 V6.3, and SCALANCE SC-600 versions 2.1.x before 2.1.3. No valid credentials are required; the attacker only needs network access to the SSH port.
- Network access to the device on SSH port 22 (TCP/22)
- No valid credentials required
- Device must be running vulnerable firmware version (V6.3 for SCALANCE M-800/S615/RUGGEDCOM RM1224, or V2.1.x before 2.1.3 for SCALANCE SC-600)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fae372f0-214a-45f2-850c-25b5457aef51Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.