Vulnerability known as TCP SACK PANIC in Industrial Products
Multiple Siemens industrial products are vulnerable to TCP SACK PANIC, a kernel-level denial of service condition caused by improper handling of TCP packets with the SACK (Selective Acknowledgment) option. A remote attacker can trigger a memory or CPU exhaustion condition by sending specially crafted TCP SACK packets, causing the affected device to become unresponsive or crash. The vulnerability affects a wide range of communication processors, industrial routers, switches, gateways, and CPU modules across the SIMATIC and SCALANCE product families. Some products have been patched; however, 23 product variants including TIM series gateways, SCALANCE M875, SCALANCE WLC series, SCALANCE S602/612/623/627-2M, RUGGEDCOM APE1404, CP 343-1 Advanced, CP 443-1 OPC UA, CP 1623, SIMATIC Teleservice Adapters, and related variants have no patch available and will not receive fixes.
- Network access to the affected device on any TCP port
- Device must be connected to a network (wired or wireless)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/38e76e42-a3c4-4fd3-ba93-3623079b35b0