Siemens SINEC OS
SINEC OS before V3.3 contains multiple third-party component vulnerabilities affecting industrial network switches including RUGGEDCOM RST2428P and SCALANCE XC/XR/XCH/XCM/XRH/XRM series. These devices are critical backbone infrastructure in Siemens industrial networks, providing network connectivity for SCADA, process control, and safety systems. The vulnerabilities include buffer overflows, memory corruption, use-after-free issues, and input validation failures that could allow unauthenticated remote code execution.
- Network access to the affected switch (management port or data network)
- No credentials required
- Affected SINEC OS version below 3.3
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7d1fadf8-c1bb-42f7-8161-91f245c0e934Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.