Siemens Nucleus Products IPv6 Stack
The IPv6 stack in Siemens Nucleus Real-Time Operating System (RTOS) networking component contains two vulnerabilities in IPv6 header processing. When an attacker sends specially crafted IPv6 packets, the stack fails to validate the headers correctly, triggering an infinite loop or uncontrolled resource consumption. This causes the affected device's networking to become unresponsive, resulting in a denial of service. The vulnerability affects Capital Embedded AR Classic, Nucleus NET, and Nucleus ReadyStart products used in industrial controllers and embedded systems across multiple critical infrastructure sectors.
- Network access to the device or network segment where the affected device resides
- Device must be running an affected version of Nucleus RTOS with IPv6 stack enabled
- No credentials or authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/443d88f5-2446-4d32-b789-826d1c2a6ccfGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.