OTPulse

Siemens Third-Party Components in SINEC OS

Act Now9.1ICS-CERT ICSA-25-226-07Aug 12, 2025
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

SINEC OS before version 3.2 contains multiple vulnerabilities in third-party components bundled with the operating system. These flaws affect RUGGEDCOM RST2428P switches and the SCALANCE XC-300, XR-300, XC-400, XR-500WG, XR-500, and XCM/XRM/XCH/XRH-300 family switches. The vulnerabilities include input validation failures, memory corruption (use-after-free, buffer overflows), integer overflows, and resource exhaustion issues across multiple CWE categories. Siemens has released SINEC OS version 3.2 to address these flaws.

What this means
What could happen
An attacker with network access to these industrial switches could exploit multiple vulnerabilities in third-party components to gain unauthorized access, execute arbitrary code, or cause the device to stop responding—potentially disrupting network connectivity for critical infrastructure like water treatment or power systems.
Who's at risk
Operators of industrial networks using Siemens RUGGEDCOM and SCALANCE switches for critical infrastructure control should be concerned. These managed switches are commonly deployed in water treatment plants, electric utilities, and other process control networks where network availability is essential to operations.
How it could be exploited
An attacker on the same network (or internet-reachable) as a RUGGEDCOM RST2428P, SCALANCE XC/XR/XCM/XRM/XCH/XRH switch running SINEC OS before version 3.2 could send specially crafted input to exploit input validation or memory corruption flaws in bundled third-party libraries. Successful exploitation could result in arbitrary code execution or denial of service without requiring authentication or user interaction.
Prerequisites
  • Network access to the industrial switch (IP connectivity)
  • SINEC OS version prior to 3.2 installed on the device
  • No authentication required for initial exploitation
remotely exploitableno authentication requiredlow complexityactively exploited (KEV)high EPSS score (13.9%)affects availability and confidentiality of network infrastructure
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (3)
3 with fix
ProductAffected VersionsFix Status
RUGGEDCOM RST2428P (6GK6242-6PA00)< 3.23.2
SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family< 3.23.2
SCALANCE XCM-/XRM-/XCH-/XRH-300 family< 3.23.2
Remediation & Mitigation
0/4
Do now
0/2
HOTFIXUpdate RUGGEDCOM RST2428P, SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500, and SCALANCE XCM-/XRM-/XCH-/XRH-300 devices to SINEC OS version 3.2 or later
WORKAROUNDRestrict network access to industrial switches using firewall rules—allow only authorized engineering and management traffic, block internet-facing access
Long-term hardening
0/2
HARDENINGImplement network segmentation to isolate industrial switch networks from business IT networks
HARDENINGFor required remote access, use secure VPN tunnels instead of direct internet exposure
CVEs (486)
CVE-2021-47316CVE-2022-48666CVE-2022-48827CVE-2022-48828CVE-2022-48829CVE-2022-49034CVE-2023-4039CVE-2023-52887CVE-2023-52918CVE-2024-6197CVE-2024-6874CVE-2024-7264CVE-2024-8176CVE-2024-9681CVE-2024-36484CVE-2024-36894CVE-2024-36901CVE-2024-36938CVE-2024-36974CVE-2024-36978CVE-2024-37078CVE-2024-38586CVE-2024-38619CVE-2024-39468CVE-2024-39469CVE-2024-39482CVE-2024-39484CVE-2024-39487CVE-2024-39495CVE-2024-39499CVE-2024-39502CVE-2024-39503CVE-2024-39505CVE-2024-39506CVE-2024-39509CVE-2024-40901CVE-2024-40902CVE-2024-40904CVE-2024-40905CVE-2024-40912CVE-2024-40916CVE-2024-40929CVE-2024-40931CVE-2024-40932CVE-2024-40934CVE-2024-40941CVE-2024-40942CVE-2024-40943CVE-2024-40945CVE-2024-40947CVE-2024-40958CVE-2024-40959CVE-2024-40960CVE-2024-40961CVE-2024-40963CVE-2024-40968CVE-2024-40971CVE-2024-40974CVE-2024-40976CVE-2024-40978CVE-2024-40980CVE-2024-40981CVE-2024-40983CVE-2024-40984CVE-2024-40987CVE-2024-40988CVE-2024-40990CVE-2024-40995CVE-2024-41000CVE-2024-41004CVE-2024-41005CVE-2024-41006CVE-2024-41007CVE-2024-41009CVE-2024-41012CVE-2024-41015CVE-2024-41017CVE-2024-41020CVE-2024-41022CVE-2024-41034CVE-2024-41035CVE-2024-41040CVE-2024-41041CVE-2024-41044CVE-2024-41046CVE-2024-41049CVE-2024-41055CVE-2024-41059CVE-2024-41063CVE-2024-41064CVE-2024-41065CVE-2024-41068CVE-2024-41070CVE-2024-41072CVE-2024-41077CVE-2024-41078CVE-2024-41081CVE-2024-41087CVE-2024-41089CVE-2024-41090CVE-2024-41091CVE-2024-41092CVE-2024-41095CVE-2024-41097CVE-2024-42076CVE-2024-42077CVE-2024-42082CVE-2024-42084CVE-2024-42086CVE-2024-42087CVE-2024-42092CVE-2024-42093CVE-2024-42094CVE-2024-42095CVE-2024-42101CVE-2024-42105CVE-2024-42145CVE-2024-42148CVE-2024-42152CVE-2024-42153CVE-2024-42154CVE-2024-42161CVE-2024-42223CVE-2024-42224CVE-2024-42229CVE-2024-42232CVE-2024-42236CVE-2024-42244CVE-2024-42247CVE-2024-43098CVE-2024-43861CVE-2024-43867CVE-2024-43871CVE-2024-43879CVE-2024-43880CVE-2024-43882CVE-2024-43883CVE-2024-43889CVE-2024-43890CVE-2024-43893CVE-2024-43894CVE-2024-43907CVE-2024-43908CVE-2024-43914CVE-2024-44935CVE-2024-44944CVE-2024-44949CVE-2024-44954CVE-2024-44960CVE-2024-44965CVE-2024-44969CVE-2024-44971CVE-2024-44987CVE-2024-44988CVE-2024-44989CVE-2024-44990CVE-2024-44995CVE-2024-44998CVE-2024-44999CVE-2024-45003CVE-2024-45006CVE-2024-45008CVE-2024-45021CVE-2024-45025CVE-2024-46673CVE-2024-46674CVE-2024-46675CVE-2024-46676CVE-2024-46677CVE-2024-46679CVE-2024-46685CVE-2024-46689CVE-2024-46702CVE-2024-46707CVE-2024-46713CVE-2024-46714CVE-2024-46719CVE-2024-46721CVE-2024-46722CVE-2024-46723CVE-2024-46724CVE-2024-46725CVE-2024-46731CVE-2024-46737CVE-2024-46738CVE-2024-46739CVE-2024-46740CVE-2024-46743CVE-2024-46744CVE-2024-46745CVE-2024-46747CVE-2024-46750CVE-2024-46755CVE-2024-46759CVE-2024-46761CVE-2024-46763CVE-2024-46771CVE-2024-46777CVE-2024-46780CVE-2024-46781CVE-2024-46782CVE-2024-46783CVE-2024-46791CVE-2024-46798CVE-2024-46800CVE-2024-46804CVE-2024-46814CVE-2024-46815CVE-2024-46817CVE-2024-46818CVE-2024-46819CVE-2024-46822CVE-2024-46828CVE-2024-46829CVE-2024-46832CVE-2024-46840CVE-2024-46844CVE-2024-47143CVE-2024-47659CVE-2024-47660CVE-2024-47663CVE-2024-47667CVE-2024-47668CVE-2024-47669CVE-2024-47679CVE-2024-47684CVE-2024-47685CVE-2024-47692CVE-2024-47696CVE-2024-47697CVE-2024-47698CVE-2024-47699CVE-2024-47701CVE-2024-47705CVE-2024-47706CVE-2024-47709CVE-2024-47710CVE-2024-47712CVE-2024-47713CVE-2024-47718CVE-2024-47723CVE-2024-47735CVE-2024-47737CVE-2024-47739CVE-2024-47740CVE-2024-47742CVE-2024-47747CVE-2024-47748CVE-2024-47749CVE-2024-47756CVE-2024-47757CVE-2024-48881CVE-2024-49851CVE-2024-49858CVE-2024-49860CVE-2024-49863CVE-2024-49867CVE-2024-49868CVE-2024-49875CVE-2024-49877CVE-2024-49878CVE-2024-49879CVE-2024-49881CVE-2024-49882CVE-2024-49883CVE-2024-49884CVE-2024-49889CVE-2024-49890CVE-2024-49892CVE-2024-49894CVE-2024-49895CVE-2024-49896CVE-2024-49900CVE-2024-49901CVE-2024-49902CVE-2024-49903CVE-2024-49907CVE-2024-49913CVE-2024-49924CVE-2024-49930CVE-2024-49933CVE-2024-49936CVE-2024-49938CVE-2024-49944CVE-2024-49948CVE-2024-49949CVE-2024-49952CVE-2024-49955CVE-2024-49957CVE-2024-49958CVE-2024-49959CVE-2024-49962CVE-2024-49963CVE-2024-49965CVE-2024-49966CVE-2024-49969CVE-2024-49971CVE-2024-49973CVE-2024-49975CVE-2024-49977CVE-2024-49981CVE-2024-49982CVE-2024-49983CVE-2024-49985CVE-2024-49997CVE-2024-50001CVE-2024-50006CVE-2024-50007CVE-2024-50008CVE-2024-50013CVE-2024-50015CVE-2024-50024CVE-2024-50033CVE-2024-50035CVE-2024-50039CVE-2024-50040CVE-2024-50044CVE-2024-50045CVE-2024-50046CVE-2024-50049CVE-2024-50051CVE-2024-50059CVE-2024-50074CVE-2024-50082CVE-2024-50083CVE-2024-50095CVE-2024-50096CVE-2024-50099CVE-2024-50179CVE-2024-50180CVE-2024-50184CVE-2024-50185CVE-2024-50188CVE-2024-50193CVE-2024-50194CVE-2024-50195CVE-2024-50198CVE-2024-50199CVE-2024-50201CVE-2024-50202CVE-2024-50218CVE-2024-50234CVE-2024-50236CVE-2024-50237CVE-2024-50251CVE-2024-50262CVE-2024-50264CVE-2024-50265CVE-2024-50267CVE-2024-50268CVE-2024-50269CVE-2024-50273CVE-2024-50278CVE-2024-50279CVE-2024-50282CVE-2024-50287CVE-2024-50290CVE-2024-50292CVE-2024-50295CVE-2024-50296CVE-2024-50299CVE-2024-50301CVE-2024-50302CVE-2024-50304CVE-2024-50602CVE-2024-52332CVE-2024-53052CVE-2024-53057CVE-2024-53059CVE-2024-53060CVE-2024-53061CVE-2024-53063CVE-2024-53066CVE-2024-53097CVE-2024-53101CVE-2024-53103CVE-2024-53104CVE-2024-53145CVE-2024-53146CVE-2024-53148CVE-2024-53150CVE-2024-53155CVE-2024-53156CVE-2024-53157CVE-2024-53158CVE-2024-53161CVE-2024-53165CVE-2024-53171CVE-2024-53172CVE-2024-53173CVE-2024-53174CVE-2024-53181CVE-2024-53183CVE-2024-53184CVE-2024-53194CVE-2024-53197CVE-2024-53198CVE-2024-53214CVE-2024-53217CVE-2024-53226CVE-2024-53227CVE-2024-53237CVE-2024-53239CVE-2024-53240CVE-2024-53241CVE-2024-53680CVE-2024-56531CVE-2024-56532CVE-2024-56533CVE-2024-56539CVE-2024-56548CVE-2024-56558CVE-2024-56562CVE-2024-56567CVE-2024-56568CVE-2024-56569CVE-2024-56570CVE-2024-56572CVE-2024-56574CVE-2024-56576CVE-2024-56581CVE-2024-56586CVE-2024-56587CVE-2024-56589CVE-2024-56593CVE-2024-56594CVE-2024-56595CVE-2024-56596CVE-2024-56597CVE-2024-56598CVE-2024-56600CVE-2024-56601CVE-2024-56602CVE-2024-56603CVE-2024-56605CVE-2024-56606CVE-2024-56610CVE-2024-56615CVE-2024-56619CVE-2024-56623CVE-2024-56629CVE-2024-56630CVE-2024-56633CVE-2024-56634CVE-2024-56636CVE-2024-56637CVE-2024-56642CVE-2024-56643CVE-2024-56644CVE-2024-56645CVE-2024-56648CVE-2024-56650CVE-2024-56659CVE-2024-56661CVE-2024-56662CVE-2024-56670CVE-2024-56681CVE-2024-56688CVE-2024-56690CVE-2024-56691CVE-2024-56698CVE-2024-56700CVE-2024-56701CVE-2024-56704CVE-2024-56705CVE-2024-56720CVE-2024-56723CVE-2024-56724CVE-2024-56728CVE-2024-56739CVE-2024-56746CVE-2024-56747CVE-2024-56748CVE-2024-56754CVE-2024-56756CVE-2024-56770CVE-2024-56779CVE-2024-56780CVE-2024-56785CVE-2024-57874CVE-2024-57951CVE-2025-21687CVE-2025-21689CVE-2025-21692CVE-2025-21694CVE-2025-21699
↑↓ Navigate · Esc Close
API: /api/v1/advisories/a66aa184-d734-4f8a-af4c-cf9128e4d3b1