Siemens TIM 4R-IE Devices
TIM 4R-IE devices contain multiple vulnerabilities in the integrated NTP (Network Time Protocol) component. The vulnerabilities stem from improper input validation (CWE-20), missing authentication mechanisms (CWE-287, CWE-294), and logic errors (CWE-681, CWE-290, CWE-362). These flaws allow remote attackers without credentials to exploit the NTP service. The affected products are all versions of TIM 4R-IE, SIPLUS NET TIM 4R-IE, and their DNP3 variants. No vendor patches are currently available for any affected product version.
- Network access to TIM 4R-IE device NTP port (port 123 UDP)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8ee13bd6-476f-407f-8380-cf0d4a1fca82Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.