Siemens TCP/IP Stack Vulnerabilities-AMNESIA:33 in SENTRON PAC / 3VA Devices (Update C)
Siemens SENTRON power monitoring and distribution devices contain memory safety vulnerabilities (CVE-2020-13987, CVE-2020-17437) in embedded TCP/IP stacks, collectively known as AMNESIA:33. These vulnerabilities can be triggered by malformed TCP/IP packets sent from the same Modbus TCP network segment, causing device crashes or reboots. Affected products include SENTRON 3VA COM100/800, 3VA DSP800, PAC2200, PAC3200, PAC3200T, PAC3220, and PAC4200 series with various version thresholds. Some PAC2200 variants with CLP Approval and MID Approval have no fix available; PAC2200 without MID Approval and other models have firmware updates available.
- Attacker must be on the same Modbus TCP network segment as the target device
- No authentication required
- No special credentials needed
- Device must be running a vulnerable firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e8d84b19-03ca-4e4d-b0d1-3496933eacdfGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.