Siemens SIMOCODE, SIMATIC, SIPLUS, SIDOOR, SIWAREX
A vulnerability exists in the integrated ICMP services within the TCP/IP stack of multiple Siemens industrial control devices. An attacker can send specially crafted ICMP packets to trigger a temporary denial of service of ICMP communication on affected products. A successful attack impacts the availability of ICMP services for a limited time until the device recovers after the attack ceases. Other communication services such as Modbus TCP and PROFINET are not affected. Siemens has released firmware updates for several product families and is preparing additional fixes for others. For products without patches, network-level mitigation is required.
- Network access to the device (attacker must be on the same network or routable network segment)
- No authentication required to send ICMP packets
Patching may require device reboot — plan for process interruption
/api/v1/advisories/42c8b8f2-1e6b-4349-b4a7-1f4c85ff6d76Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.