Siemens Interniche IP-Stack
The Interniche IP-Stack used in Siemens industrial products does not properly enforce TCP sequence number validation. It accepts sequence numbers within a broad range instead of strictly validating them, allowing unauthenticated remote attackers to interfere with TCP connection setup. This vulnerability affects TCP-based services and requires precise timing and spoofed IP packet injection to exploit. A successful attack can cause denial of service by disrupting communications to industrial controllers and modules.
- Network reachability to the device's Ethernet port
- Ability to send IP packets with spoofed source addresses (requires layer 3 or layer 2 access)
- Precise timing during TCP connection initiation or data transfer
- Device must be actively using TCP-based communication
Patching may require device reboot — plan for process interruption
/api/v1/advisories/74824a19-b33c-481d-beec-72917416cb4aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.