Denial of Service Vulnerability in PROFINET Devices via DCE-RPC Packets
This vulnerability exists in the Siemens PROFINET-IO (PNIO) stack in versions prior to V6.0. When multiple crafted diagnostic package requests are sent to the DCE-RPC interface of affected PROFINET devices, the device becomes unresponsive and stops handling legitimate PROFINET communication. Affected products include: SCALANCE industrial switches and routers; SIMATIC communication modules, distributed I/O stations, and motor drives; SIMOTION motion controllers; SINAMICS variable frequency drives; and various development/evaluation kits. Siemens has released updated firmware for many products but has indicated no fix will be available for several older or end-of-life modules including CP 343-1 series, older ET 200 variants (ET200ecoPN, ET 200S), SIMATIC PN/PN Coupler, SIMATIC RF series, and SOFTNET-IE PNIO.
- Network access to the PROFINET device (typically Ethernet, reachable from the engineering network or if directly connected to plant network)
- No credentials or authentication required
- Device must be running vulnerable PROFINET-IO stack version prior to V6.0
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e29968e5-1ffe-4bea-91cc-24bcecf39986