Siemens SCALANCE X200 IRT
The SCALANCE X200 IRT switch family contains a denial of service vulnerability in the SNMP agent. A remote attacker can send a malformed SNMP packet to crash the SNMP service on affected switches, rendering the device unable to relay network traffic until manually rebooted. The vulnerability affects all versions prior to firmware 5.5.0 across 13 switch models including the SCALANCE X200-4P IRT, X201-3P IRT, X202-2P IRT, X204IRT, and the XF series variants, as well as the SIPLUS NET SCALANCE X202-2P IRT. No authentication is required to trigger the denial of service, and the attack has low complexity.
- Network access to the SNMP agent port (UDP 161)
- The SNMP service must be enabled on the switch (enabled by default)
- SCALANCE X200 IRT firmware version earlier than 5.5.0
Patching may require device reboot — plan for process interruption
/api/v1/advisories/93b937ab-10f6-46a7-b0b0-c61e1e77ea18Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.