Siemens Nucleus RTOS TCP/IP Stack
The TCP/IP stack and related services (FTP, TFTP) in Siemens Nucleus Real-Time Operating System (RTOS) contain multiple vulnerabilities known as "NUCLEUS:13." These flaws include buffer overflows (CWE-119, CWE-125), type confusion (CWE-843), integer underflow (CWE-191), and other memory-safety issues affecting the networking component (Nucleus NET). The vulnerabilities allow remote code execution without authentication. Affected products: Nucleus NET (all versions—no fix available), Nucleus ReadyStart V3 (versions before 2017.02.4), Nucleus ReadyStart V4 (versions before 4.1.1), and Nucleus Source Code (all versions—no fix available).
- Network connectivity to the device running Nucleus RTOS on any port handled by the TCP/IP stack
- No authentication required
- Device must be running a vulnerable version: Nucleus NET (all versions), Nucleus ReadyStart v3 before 2017.02.4, or Nucleus ReadyStart v4 before 4.1.1
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ce4fe292-8b23-417e-ab41-0d6b8d83e5b1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.