Siemens PROFINET Devices
A Denial of Service vulnerability exists in Siemens PROFINET-based industrial switches and controllers. When a large volume of PROFINET Discovery and Configuration Protocol (DCP) reset packets (Ethertype 0x8892) are sent to affected devices, they become unresponsive and cannot process legitimate communication. Vulnerable devices include the SCALANCE X, XB, XC, XF, XP, XR, XM switch families; SCALANCE W wireless series; SIMATIC S7-1200 CPUs; SIMATIC MV500/540/550/560 process modules; SIMOCODE proV Ethernet/IP and PROFINET variants; RUGGEDCOM RM1224 industrial routers; and various SIMATIC network communication modules. Siemens has released firmware updates for most affected products. For products where updates are not available (legacy SCALANCE W wireless models, SIMATIC CP 1604/1616/1626, SIMATIC IE/PB-LINK, DCP evaluation kits), network-level filtering and DCP disabling are recommended.
- Network access to the affected device
- Ability to send Ethernet frames with Ethertype 0x8892 (PROFINET DCP)
- No credentials or prior access required
- Device must have PROFINET enabled or discoverable (default state)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e6e3bb8f-27bd-4575-9739-7572be58d5a3