Impact
The vulnerability exists as a null pointer dereference triggered when the affected devices process specially crafted IPv4 packets. An attacker can send a carefully constructed packet over the network, causing the device to crash and become inoperable. This loss of service requires a manual restart to recover, directly impacting availability.
Affected Systems
The flaw affects a wide range of Siemens network equipment, including Internet‑Enabled/Power‑Backed LINK routers, RUGGEDCOM LTE routers, SCALANCE series switches and routers, and industrial controllers such as the SIMATIC ET 200S/200pro, S7‑1500, S7‑300, S7‑400, S7‑410 families, SINAMICS drives, SINUMERIK 840D, SIMIT units, and SITOP power supplies. Both embedded routers and Ethernet interfaces are impacted.
Risk and Exploitability
With a CVSS score of 8.7, the vulnerability is considered severe. No EPSS score is currently available, and the flaw is not listed in the CISA KEV catalog. It is likely exploitable through any network interface that accepts IPv4 traffic, requiring no special privileges. An attacker only needs the ability to reach the target device and can cause a denial of service that persists until a manual restart or firmware update is applied.
OpenCVE Enrichment