Siemens SCALANCE Switch Families
Siemens SCALANCE industrial switches contain "Bad Alloc" memory allocation vulnerabilities in their underlying operating system. These vulnerabilities allow remote attackers to send specially crafted packets that cause the switch to crash or malfunction, disrupting network connectivity. The vulnerabilities affect a broad range of SCALANCE X-series and XR-series managed switches. Some product families (X-204, X-206, X-208, X-212, X-216, X-224, X-200 IRT, and XF-series) have firmware updates available. However, older product families including X-302-7 EEC, X-307, X-308, X-310, X-306, X-304, and XR-324 series have no fix planned and will remain vulnerable.
- Network access to the switch (no authentication required)
- Ability to send crafted network packets to the switch's management or data plane interface
Patching may require device reboot — plan for process interruption
/api/v1/advisories/552db0e1-dd16-4815-a3fe-686ad822b405Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.