B&R Automation Runtime DoS Vulnerability in System Diagnostics Manager (SDM)
Plan PatchCVSS 10sa25p002Oct 7, 2025
B&R Automation
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
A vulnerability in the System Diagnostic Manager (SDM) component of B&R Automation Runtime versions prior to 6.3 could allow an attacker on the network to cause the runtime to stop, denying service to the industrial process. The SDM is disabled by default in Automation Runtime 6, but if enabled for remote diagnostics or maintenance, it presents a network-accessible attack surface. An attacker with network access could exploit this to halt production operations.
What this means
What could happen
An attacker on the network could cause the Automation Runtime to stop, halting all industrial processes running on that controller until operations staff manually restart the system.
Who's at risk
Facilities operating B&R Automation Runtime controllers, particularly in manufacturing, power generation, water treatment, and process automation environments. Primarily affects systems where the System Diagnostic Manager is enabled for remote maintenance or engineering access.
How it could be exploited
An attacker with network access to the System Diagnostic Manager (SDM) port can send a specially crafted request that causes the Automation Runtime to crash or stop responding, effectively denying service to the industrial process.
Prerequisites
- Network access to the System Diagnostic Manager (SDM) port
- SDM must be enabled on the target system (disabled by default in Automation Runtime 6)
remotely exploitableno authentication requiredlow complexityaffects process availabilityhigh CVSS score (10)
Exploitability
Unlikely to be exploited — EPSS score 0.1%
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
Automation Runtime <6.3<6.36.3
Automation Runtime <Q4.93<Q4.936.3
Remediation & Mitigation
0/4
Do now
0/2WORKAROUNDDisable the System Diagnostic Manager (SDM) if not required for production operations
HARDENINGRestrict network access to the SDM port using firewall rules to limit connections to authorized engineering workstations and maintenance personnel only
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate Automation Runtime to version 6.3 or Q4.93 or later
Long-term hardening
0/1HARDENINGEnsure SDM is not enabled on systems located outside properly secured production networks or in facilities without adequate physical and logical access controls
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/7e335762-a0d3-443a-83a8-daf22e91a913Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.