Denial of Service Vulnerability in PROFINET Stack Integrated on Interniche Stack
The PROFINET stack integrated with the Interniche TCP/IP library contains a vulnerability in packet validation that allows a network attacker to cause denial of service by sending crafted PROFINET messages. Affected devices will crash or stop responding, requiring manual restart. The vulnerability exists across a wide range of Siemens automation products including PLCs (S7-300, S7-400, S7-1500), distributed I/O modules (ET 200 series), and motor drives (SINAMICS). Siemens has released firmware updates for many product families but has designated several legacy and recent models (S7-400 V7 series, certain ET 200 variants, S110 drives, WinAC RTX, PROFINET couplers) as unfixable. For products with available patches, firmware updates must be deployed during maintenance windows as they may affect ongoing operations.
- Network access to PROFINET Ethernet port (port 34962 UDP or 34963 TCP)
- Device must be running vulnerable firmware version with PROFINET stack enabled
- No credentials or authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9054c436-f970-4f7b-a81f-fd32f52672df