Denial of Service in OPC UA in Industrial Products
A vulnerability in the OPC UA server implementation of several Siemens industrial products allows unauthenticated remote attackers to cause a denial of service by sending crafted input to the OPC UA service. The affected products include SIMATIC S7-1500 CPUs and software controllers, HMI/operator panels (Comfort and KTP series), industrial PCs, SCADA/supervisory systems (SINEC NMS, TeleControl, SINUMERIK), and engineering software (WinCC OA, WinCC Runtime). When the OPC UA service crashes, any control system relying on OPC UA for real-time data exchange or commands becomes unable to communicate with field devices until the service is restarted. Several products do not have vendor updates available.
- Network access to the OPC UA server port (default port 4840)
- OPC UA service must be enabled on the affected product
- No credentials or user interaction required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f00798ce-3de0-4c20-9db3-b8ab36a661ed