Siemens Linux-based Products (Update J)
A vulnerability in the Linux kernel when handling ICMP packets (SAD DNS) affects the Domain Name System resolver on multiple Siemens industrial products. By sending specially crafted ICMP packets, an attacker can trigger incorrect DNS resolution on the affected device, potentially redirecting network traffic and disrupting control system communication. The vulnerability requires network access and has high attack complexity, but does not require authentication. No known public exploits are currently available.
- Network-layer access to the affected device (ICMP packets must be able to reach it)
- Device must be making outbound DNS queries
- Device must be running a vulnerable version of the Linux kernel in the version ranges listed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6a37b114-8cbd-4585-b37c-468d447907b8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.