CVE-2022-46351: CWE-400: Uncontrolled Resource Consumption in Siemens SCALANCE X204RNA (HSR)
A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SCALANCE X204RNA (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (HSR) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP/HSR) (All versions < V3.2.7). Specially crafted PROFINET DCP packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2).
AI Analysis
Technical Summary
CVE-2022-46351 is a medium-severity vulnerability affecting multiple versions of Siemens SCALANCE X204RNA devices, specifically those running versions prior to 3.2.7. These devices are industrial network components used primarily in automation environments, supporting High-availability Seamless Redundancy (HSR) and Parallel Redundancy Protocol (PRP) for fault-tolerant Ethernet communication. The vulnerability arises from improper handling of PROFINET Discovery and Configuration Protocol (DCP) packets at Layer 2 of the network stack. An attacker on the same local Ethernet segment can send specially crafted PROFINET DCP packets that trigger uncontrolled resource consumption within the affected device. This resource exhaustion leads to a denial of service (DoS) condition, disrupting network communication and potentially halting industrial processes reliant on these devices. The vulnerability requires low privileges (local access with limited privileges) and no user interaction, but exploitation is limited to the local Ethernet segment, reducing the attack surface to internal or physically proximate attackers. The CVSS 3.1 base score is 5.5, reflecting a medium impact primarily on availability, with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and Siemens has released version 3.2.7 as a patched update to address this issue.
Potential Impact
For European organizations, especially those in manufacturing, critical infrastructure, and industrial automation sectors, this vulnerability poses a risk of operational disruption. Siemens SCALANCE devices are widely deployed in European industrial networks due to Siemens' strong market presence. A successful DoS attack could interrupt communication between industrial controllers and field devices, leading to production downtime, safety system failures, or loss of process control. Given the Layer 2 nature of the attack, it could affect segmented network zones designed for redundancy and high availability, undermining network resilience. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could have significant financial and safety implications, particularly in sectors such as automotive manufacturing, energy production, and transportation systems prevalent in countries like Germany, France, and Italy. The requirement for local network access limits remote exploitation but insider threats or compromised internal devices could leverage this vulnerability to cause disruption.
Mitigation Recommendations
Organizations should prioritize upgrading all affected Siemens SCALANCE X204RNA devices to firmware version 3.2.7 or later, which contains the fix for this vulnerability. Network segmentation should be enforced to restrict access to industrial Ethernet segments hosting these devices, limiting the ability of unauthorized users or compromised hosts to send malicious PROFINET DCP packets. Implement strict access controls and monitoring on local Ethernet segments, including anomaly detection for unusual PROFINET traffic patterns. Employ network intrusion detection systems (NIDS) capable of inspecting Layer 2 traffic to identify and alert on malformed or excessive DCP packets. Regularly audit device firmware versions and configuration to ensure compliance with security policies. Additionally, physical security controls should be enhanced to prevent unauthorized access to network infrastructure. Since exploitation requires local network presence, reducing the attack surface through network design and access restrictions is critical. Finally, incorporate this vulnerability into incident response plans to quickly identify and mitigate any denial of service events impacting industrial networks.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Belgium, Poland, Czech Republic, Austria, Switzerland
CVE-2022-46351: CWE-400: Uncontrolled Resource Consumption in Siemens SCALANCE X204RNA (HSR)
Description
A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SCALANCE X204RNA (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (HSR) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP/HSR) (All versions < V3.2.7). Specially crafted PROFINET DCP packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2).
AI-Powered Analysis
Technical Analysis
CVE-2022-46351 is a medium-severity vulnerability affecting multiple versions of Siemens SCALANCE X204RNA devices, specifically those running versions prior to 3.2.7. These devices are industrial network components used primarily in automation environments, supporting High-availability Seamless Redundancy (HSR) and Parallel Redundancy Protocol (PRP) for fault-tolerant Ethernet communication. The vulnerability arises from improper handling of PROFINET Discovery and Configuration Protocol (DCP) packets at Layer 2 of the network stack. An attacker on the same local Ethernet segment can send specially crafted PROFINET DCP packets that trigger uncontrolled resource consumption within the affected device. This resource exhaustion leads to a denial of service (DoS) condition, disrupting network communication and potentially halting industrial processes reliant on these devices. The vulnerability requires low privileges (local access with limited privileges) and no user interaction, but exploitation is limited to the local Ethernet segment, reducing the attack surface to internal or physically proximate attackers. The CVSS 3.1 base score is 5.5, reflecting a medium impact primarily on availability, with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and Siemens has released version 3.2.7 as a patched update to address this issue.
Potential Impact
For European organizations, especially those in manufacturing, critical infrastructure, and industrial automation sectors, this vulnerability poses a risk of operational disruption. Siemens SCALANCE devices are widely deployed in European industrial networks due to Siemens' strong market presence. A successful DoS attack could interrupt communication between industrial controllers and field devices, leading to production downtime, safety system failures, or loss of process control. Given the Layer 2 nature of the attack, it could affect segmented network zones designed for redundancy and high availability, undermining network resilience. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could have significant financial and safety implications, particularly in sectors such as automotive manufacturing, energy production, and transportation systems prevalent in countries like Germany, France, and Italy. The requirement for local network access limits remote exploitation but insider threats or compromised internal devices could leverage this vulnerability to cause disruption.
Mitigation Recommendations
Organizations should prioritize upgrading all affected Siemens SCALANCE X204RNA devices to firmware version 3.2.7 or later, which contains the fix for this vulnerability. Network segmentation should be enforced to restrict access to industrial Ethernet segments hosting these devices, limiting the ability of unauthorized users or compromised hosts to send malicious PROFINET DCP packets. Implement strict access controls and monitoring on local Ethernet segments, including anomaly detection for unusual PROFINET traffic patterns. Employ network intrusion detection systems (NIDS) capable of inspecting Layer 2 traffic to identify and alert on malformed or excessive DCP packets. Regularly audit device firmware versions and configuration to ensure compliance with security policies. Additionally, physical security controls should be enhanced to prevent unauthorized access to network infrastructure. Since exploitation requires local network presence, reducing the attack surface through network design and access restrictions is critical. Finally, incorporate this vulnerability into incident response plans to quickly identify and mitigate any denial of service events impacting industrial networks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2022-11-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf77f9
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 4:23:08 PM
Last updated: 8/3/2025, 8:24:41 PM
Views: 10
Related Threats
CVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumCVE-2025-55012: CWE-288: Authentication Bypass Using an Alternate Path or Channel in zed-industries zed
HighCVE-2025-8854: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in bulletphysics bullet3
HighCVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCVE-2025-54878: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.