DNS "Name:Wreck" Vulnerabilities in Multiple Siemens Energy AGT and SGT solutions
One of the DNS "Name:Wreck" vulnerabilities (buffer overflow, CWE-787) may affect Siemens Energy gas turbine control systems: SGT-100, SGT-200, SGT-300, and SGT-400 (industrial models with Allen Bradley control) and SGT-A20, SGT-A35, and SGT-A65 (aeroderivative models with FT125 control). The vulnerability exists in the DNS implementation of the underlying Rockwell Automation / Allen Bradley components. Remote attackers with network access could send malicious DNS responses to trigger code execution on the turbine controller. Fixes are available through Rockwell Automation security advisory PN1564 for the affected Allen Bradley components, but some updates may not be compatible with other integrated system components.
- Network access to the control system on the path between the turbine PLC and DNS resolvers
- No authentication required to send DNS packets
- Turbine controller must perform DNS lookups (typical for modern industrial control systems)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bbcf22e6-058f-4997-a4da-6beac2f24b7a