OTPulse

Siemens SINEC OS

Act Now10ICS-CERT ICSA-26-043-06Jan 28, 2026
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

SINEC OS versions before 3.3 contain multiple vulnerabilities in third-party components (CWE-787, CWE-415, CWE-20, buffer overflows, use-after-free, out-of-bounds access, and improper input validation). These flaws allow remote code execution without authentication or user interaction. Affected devices include RUGGEDCOM RST2428P and multiple SCALANCE XC/XR/XCH/XCM/XRH/XRM series switches used in industrial networks for redundancy and hardened ethernet connectivity.

What this means
What could happen
An attacker with network access can execute arbitrary code on SINEC OS-based devices (switches and routers), potentially gaining control of critical network infrastructure and disrupting communication between industrial control systems and field devices.
Who's at risk
Water authorities and utilities using Siemens RUGGEDCOM and SCALANCE industrial ethernet switches and routers in their control networks. This includes any operator running process networks that rely on these devices for connectivity between RTUs, PLCs, HMIs, and remote telemetry systems.
How it could be exploited
An attacker on the network can send a crafted packet to the SINEC OS device without authentication. The vulnerability exists in third-party components embedded in the operating system, allowing buffer overflow or other memory corruption attacks that lead to remote code execution. Once code execution is achieved, the attacker can modify device configuration, intercept traffic, or disrupt network availability.
Prerequisites
  • Network access to the affected SINEC OS device (typically on industrial network)
  • No authentication required
  • No special user interaction required
Remotely exploitableNo authentication requiredLow complexityActively exploited (KEV)High EPSS score (50.3%)Affects network infrastructure critical to operations
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (16)
16 with fix
ProductAffected VersionsFix Status
RUGGEDCOM RST2428P (6GK6242-6PA00)< 3.33.3
SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family< 3.33.3
SCALANCE XCH328< 3.33.3
SCALANCE XCM324< 3.33.3
SCALANCE XCM328< 3.33.3
Remediation & Mitigation
0/3
Do now
0/2
HOTFIXUpdate SINEC OS to version 3.3 or later on all affected RUGGEDCOM and SCALANCE devices
HARDENINGImplement network segmentation to restrict access to SINEC OS devices only from trusted engineering workstations and control systems that require communication with these switches/routers
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HARDENINGMonitor network traffic to and from SINEC OS devices for signs of exploitation attempts
↑↓ Navigate · Esc Close
API: /api/v1/advisories/7d1fadf8-c1bb-42f7-8161-91f245c0e934
Siemens SINEC OS | CVSS 10 - OTPulse