Skip to main content

CVE-2022-46351: CWE-400: Uncontrolled Resource Consumption in Siemens SCALANCE X204RNA (HSR)

Medium
Published: Tue Dec 13 2022 (12/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Siemens
Product: SCALANCE X204RNA (HSR)

Description

A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SCALANCE X204RNA (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (HSR) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP/HSR) (All versions < V3.2.7). Specially crafted PROFINET DCP packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2).

AI-Powered Analysis

AILast updated: 06/21/2025, 16:23:08 UTC

Technical Analysis

CVE-2022-46351 is a medium-severity vulnerability affecting multiple versions of Siemens SCALANCE X204RNA devices, specifically those running versions prior to 3.2.7. These devices are industrial network components used primarily in automation environments, supporting High-availability Seamless Redundancy (HSR) and Parallel Redundancy Protocol (PRP) for fault-tolerant Ethernet communication. The vulnerability arises from improper handling of PROFINET Discovery and Configuration Protocol (DCP) packets at Layer 2 of the network stack. An attacker on the same local Ethernet segment can send specially crafted PROFINET DCP packets that trigger uncontrolled resource consumption within the affected device. This resource exhaustion leads to a denial of service (DoS) condition, disrupting network communication and potentially halting industrial processes reliant on these devices. The vulnerability requires low privileges (local access with limited privileges) and no user interaction, but exploitation is limited to the local Ethernet segment, reducing the attack surface to internal or physically proximate attackers. The CVSS 3.1 base score is 5.5, reflecting a medium impact primarily on availability, with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and Siemens has released version 3.2.7 as a patched update to address this issue.

Potential Impact

For European organizations, especially those in manufacturing, critical infrastructure, and industrial automation sectors, this vulnerability poses a risk of operational disruption. Siemens SCALANCE devices are widely deployed in European industrial networks due to Siemens' strong market presence. A successful DoS attack could interrupt communication between industrial controllers and field devices, leading to production downtime, safety system failures, or loss of process control. Given the Layer 2 nature of the attack, it could affect segmented network zones designed for redundancy and high availability, undermining network resilience. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could have significant financial and safety implications, particularly in sectors such as automotive manufacturing, energy production, and transportation systems prevalent in countries like Germany, France, and Italy. The requirement for local network access limits remote exploitation but insider threats or compromised internal devices could leverage this vulnerability to cause disruption.

Mitigation Recommendations

Organizations should prioritize upgrading all affected Siemens SCALANCE X204RNA devices to firmware version 3.2.7 or later, which contains the fix for this vulnerability. Network segmentation should be enforced to restrict access to industrial Ethernet segments hosting these devices, limiting the ability of unauthorized users or compromised hosts to send malicious PROFINET DCP packets. Implement strict access controls and monitoring on local Ethernet segments, including anomaly detection for unusual PROFINET traffic patterns. Employ network intrusion detection systems (NIDS) capable of inspecting Layer 2 traffic to identify and alert on malformed or excessive DCP packets. Regularly audit device firmware versions and configuration to ensure compliance with security policies. Additionally, physical security controls should be enhanced to prevent unauthorized access to network infrastructure. Since exploitation requires local network presence, reducing the attack surface through network design and access restrictions is critical. Finally, incorporate this vulnerability into incident response plans to quickly identify and mitigate any denial of service events impacting industrial networks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2022-11-30T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf77f9

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 4:23:08 PM

Last updated: 8/3/2025, 8:24:41 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats