Denial of Service Vulnerability in Profinet Devices
A denial of service vulnerability in Siemens PROFINET devices allows remote attackers to flood affected devices with malformed DCP (Discovery and Configuration Protocol) reset packets, causing the device to become unresponsive. The vulnerability affects a wide range of SCALANCE industrial switches and routers, SIMATIC S7-1200 CPUs, RUGGEDCOM hardened routers, wireless access points, and related Ethernet modules used in critical infrastructure automation networks. Siemens has released firmware updates for many affected product families; however, numerous SCALANCE W-series wireless models and legacy communication modules have no fix available. The vulnerability requires only network access and no credentials to exploit.
- Network access to the affected device on PROFINET port (typically UDP/TCP 34964)
- No credentials required
- Device must be connected to an Ethernet network
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cff108e4-46cf-4e06-84ac-2b488f096b21