Siemens SINEC OS
Low Risk3.1ICS-CERT ICSA-25-254-04Sep 9, 2025
Attack VectorAdjacent
Auth RequiredNone
ComplexityHigh
User InteractionNone needed
Summary
SINEC OS on RUGGEDCOM RST2428P is affected by vulnerabilities in open UDP port implementations. An attacker without authentication could query open ports to access non-sensitive information or send crafted packets that cause temporary denial of service. Siemens is preparing fixes and recommends network protection mechanisms in the interim.
What this means
What could happen
An attacker on the same network segment could query open UDP ports on the RUGGEDCOM RST2428P to view non-sensitive device information or send crafted packets that briefly interrupt device communications, causing temporary service disruption.
Who's at risk
Water utilities and municipal electric systems using Siemens RUGGEDCOM RST2428P ruggedized switches for critical automation and SCADA networks should assess exposure, particularly if the device is deployed in flat networks or networks with untrusted local access.
How it could be exploited
An attacker sends UDP packets to open ports on the device without needing credentials. The device responds with information or processes the malformed packets in a way that consumes resources, momentarily affecting availability.
Prerequisites
- Network access to the same broadcast domain as the RUGGEDCOM RST2428P (Layer 2 or Layer 3 adjacency)
- No authentication or credentials required
Remotely exploitable from adjacent network segmentNo authentication requiredNo patch available yetLow CVSS score but affects network availability
Exploitability
Low exploit probability (EPSS 0.0%)
Affected products (1)
ProductAffected VersionsFix Status
RUGGEDCOM RST2428P (6GK6242-6PA00)All versionsNo fix (EOL)
Remediation & Mitigation
0/3
Do now
0/2HARDENINGPlace the RUGGEDCOM RST2428P behind a managed switch or firewall that blocks unsolicited UDP traffic from reaching the device
HARDENINGSegment the network so that the device is only reachable from trusted engineering workstations and management systems
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXMonitor Siemens support portal for firmware updates and apply when available
CVEs (2)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/be64a738-a8b9-49f9-8685-c7968256712d