SegmentSmack in VxWorks-based Industrial Devices
SegmentSmack is a TCP stack vulnerability in VxWorks-based devices that allows remote attackers to cause a denial-of-service condition. An attacker can force the TCP stack to perform expensive computations for each incoming packet, exhausting CPU resources and making the device unresponsive. The vulnerability affects numerous Siemens SCALANCE industrial Ethernet switches (X206, X200, X201, X202, X204, X208, X212, X216, X224, XF, XR families) and SIMATIC communications processors (CP 343-1, CP 442-1, CP 443-1, RF180C, RF182C). Siemens has released firmware updates for most products; however, CP 343-1 Advanced, RF180C, RF182C, and SIPLUS NET CP 343-1 Advanced have no fixes available.
- Network access to the device (reachable on network)
- No authentication required
- Attacker can send TCP packets to the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/28d5ecee-a4a9-41c9-9702-7284d50d4296