CVE-2026-27663: CWE-770: Allocation of Resources Without Limits or Throttling in Siemens CPCI85 Central Processing/Communication
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), RTUM85 RTU Base (All versions < V26.10). The affected application contains denial-of-service (DoS) vulnerability. The remote operation mode is susceptible to a resource exhaustion condition when subjected to a high volume of requests. Sending multiple requests can exhaust resources, preventing parameterization and requiring a reset or reboot to restore functionality.
AI Analysis
Technical Summary
CVE-2026-27663 is a denial-of-service (DoS) vulnerability classified under CWE-770, which involves allocation of resources without proper limits or throttling. It affects Siemens CPCI85 Central Processing/Communication and RTUM85 RTU Base products in all versions prior to V26.10. The vulnerability manifests when the affected system's remote operation mode receives a high volume of requests, leading to resource exhaustion. This exhaustion prevents the system from performing parameterization tasks and ultimately requires a reset or reboot to recover normal operation. The vulnerability can be exploited remotely without authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 6.5, reflecting medium severity, with attack vector as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). There are no patches currently linked, and no known exploits have been reported in the wild. This vulnerability is particularly relevant for industrial control systems where availability is critical, as disruption can affect operational continuity. The root cause is the lack of resource allocation limits or throttling mechanisms in the software, allowing an attacker to overwhelm the system by flooding it with requests.
Potential Impact
The primary impact of CVE-2026-27663 is denial of service, which can disrupt industrial control processes relying on Siemens CPCI85 and RTUM85 products. This can lead to operational downtime, requiring manual intervention to reset or reboot affected devices. In critical infrastructure environments such as energy, manufacturing, and utilities, such downtime can cause significant operational and financial losses. Although confidentiality and integrity are not directly affected, the availability impact can indirectly affect safety and reliability of industrial processes. The ease of exploitation without authentication and user interaction increases the risk of automated attacks or exploitation by insiders with network access. Organizations worldwide using these Siemens products in their industrial control systems face potential interruptions, especially if they lack network segmentation or DoS mitigation controls. The absence of known exploits suggests limited current exploitation, but the vulnerability remains a concern for future targeted attacks or automated scanning.
Mitigation Recommendations
1. Apply patches or updates from Siemens as soon as they become available for CPCI85 and RTUM85 products to address this vulnerability. 2. Implement network segmentation to isolate industrial control systems from general IT networks and limit exposure to potentially malicious traffic. 3. Deploy rate limiting and traffic filtering at network boundaries to detect and block excessive request volumes targeting the affected systems. 4. Monitor network traffic for unusual spikes or patterns indicative of resource exhaustion attempts. 5. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous request floods against Siemens industrial devices. 6. Establish incident response procedures to quickly identify and recover from DoS conditions, including automated alerts and system reset protocols. 7. Restrict remote access to these devices to trusted hosts and secure communication channels, such as VPNs with strong authentication. 8. Conduct regular security assessments and penetration testing focused on industrial control system resilience against DoS attacks. These measures go beyond generic advice by focusing on network-level controls, monitoring, and operational readiness specific to industrial environments.
Affected Countries
United States, Germany, China, Russia, India, United Kingdom, France, South Korea, Japan, Brazil
CVE-2026-27663: CWE-770: Allocation of Resources Without Limits or Throttling in Siemens CPCI85 Central Processing/Communication
Description
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), RTUM85 RTU Base (All versions < V26.10). The affected application contains denial-of-service (DoS) vulnerability. The remote operation mode is susceptible to a resource exhaustion condition when subjected to a high volume of requests. Sending multiple requests can exhaust resources, preventing parameterization and requiring a reset or reboot to restore functionality.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27663 is a denial-of-service (DoS) vulnerability classified under CWE-770, which involves allocation of resources without proper limits or throttling. It affects Siemens CPCI85 Central Processing/Communication and RTUM85 RTU Base products in all versions prior to V26.10. The vulnerability manifests when the affected system's remote operation mode receives a high volume of requests, leading to resource exhaustion. This exhaustion prevents the system from performing parameterization tasks and ultimately requires a reset or reboot to recover normal operation. The vulnerability can be exploited remotely without authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 6.5, reflecting medium severity, with attack vector as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). There are no patches currently linked, and no known exploits have been reported in the wild. This vulnerability is particularly relevant for industrial control systems where availability is critical, as disruption can affect operational continuity. The root cause is the lack of resource allocation limits or throttling mechanisms in the software, allowing an attacker to overwhelm the system by flooding it with requests.
Potential Impact
The primary impact of CVE-2026-27663 is denial of service, which can disrupt industrial control processes relying on Siemens CPCI85 and RTUM85 products. This can lead to operational downtime, requiring manual intervention to reset or reboot affected devices. In critical infrastructure environments such as energy, manufacturing, and utilities, such downtime can cause significant operational and financial losses. Although confidentiality and integrity are not directly affected, the availability impact can indirectly affect safety and reliability of industrial processes. The ease of exploitation without authentication and user interaction increases the risk of automated attacks or exploitation by insiders with network access. Organizations worldwide using these Siemens products in their industrial control systems face potential interruptions, especially if they lack network segmentation or DoS mitigation controls. The absence of known exploits suggests limited current exploitation, but the vulnerability remains a concern for future targeted attacks or automated scanning.
Mitigation Recommendations
1. Apply patches or updates from Siemens as soon as they become available for CPCI85 and RTUM85 products to address this vulnerability. 2. Implement network segmentation to isolate industrial control systems from general IT networks and limit exposure to potentially malicious traffic. 3. Deploy rate limiting and traffic filtering at network boundaries to detect and block excessive request volumes targeting the affected systems. 4. Monitor network traffic for unusual spikes or patterns indicative of resource exhaustion attempts. 5. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous request floods against Siemens industrial devices. 6. Establish incident response procedures to quickly identify and recover from DoS conditions, including automated alerts and system reset protocols. 7. Restrict remote access to these devices to trusted hosts and secure communication channels, such as VPNs with strong authentication. 8. Conduct regular security assessments and penetration testing focused on industrial control system resilience against DoS attacks. These measures go beyond generic advice by focusing on network-level controls, monitoring, and operational readiness specific to industrial environments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- siemens
- Date Reserved
- 2026-02-23T10:07:00.530Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c57a7f3c064ed76f9f9d31
Added to database: 3/26/2026, 6:27:11 PM
Last enriched: 3/26/2026, 6:30:26 PM
Last updated: 3/27/2026, 5:26:50 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.