Siemens Nucleus DNS (Update A)
The DNS client in Siemens Nucleus NET and Nucleus ReadyStart contains a vulnerability (part of the "NAME:WRECK" DNS vulnerability set) related to improper handling of UDP port numbers in DNS requests. This allows an attacker on the network to poison the DNS cache or spoof DNS responses, redirecting affected devices to attacker-controlled servers. Nucleus NET (all versions) has no available fix. Nucleus ReadyStart is fixed in version 2013.08 or later. Nucleus Source Code including affected DNS modules also has no fix available.
- Network access to the same network segment as the affected device
- Ability to send UDP packets to the DNS client
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7007bb3e-24c4-47f2-8a92-113782bb36e3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.