First published: Tue Dec 13 2022(Updated: )
A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SCALANCE X204RNA (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (HSR) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP/HSR) (All versions < V3.2.7). Specially crafted PROFINET DCP packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2).
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens 6GK5204-0BA00-2MB2 | <3.2.7 | |
Siemens 6GK5204-0BA00-2MB2 Firmware | ||
siemens 6gk5204-0ba00-2kb2 | <3.2.7 | |
Siemens 6GK5204-0BA00-2KB2 Firmware | ||
Siemens 6GK5204-0BS00-2NA3 | <3.2.7 | |
Siemens 6GK5204-0BS00-2NA3 Firmware | ||
Siemens 6GK5204-0BS00-3LA3 | <3.2.7 | |
Siemens 6GK5204-0BS00-3LA3 Firmware | ||
Siemens 6GK5204-0BS00-3PA3 | <3.2.7 | |
Siemens 6GK5204-0BS00-3PA3 Firmware | ||
All of | ||
Siemens 6GK5204-0BA00-2MB2 | <3.2.7 | |
Siemens 6GK5204-0BA00-2MB2 Firmware | ||
All of | ||
siemens 6gk5204-0ba00-2kb2 | <3.2.7 | |
Siemens 6GK5204-0BA00-2KB2 Firmware | ||
All of | ||
Siemens 6GK5204-0BS00-2NA3 | <3.2.7 | |
Siemens 6GK5204-0BS00-2NA3 Firmware | ||
All of | ||
Siemens 6GK5204-0BS00-3LA3 | <3.2.7 | |
Siemens 6GK5204-0BS00-3LA3 Firmware | ||
All of | ||
Siemens 6GK5204-0BS00-3PA3 | <3.2.7 | |
Siemens 6GK5204-0BS00-3PA3 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46351 has been classified with a high severity level due to its potential impact on affected devices.
To mitigate CVE-2022-46351, update the firmware of affected SCALANCE X204RNA devices to version V3.2.7 or higher.
All versions of SCALANCE X204RNA devices prior to V3.2.7 are vulnerable to CVE-2022-46351.
CVE-2022-46351 affects SCALANCE X204RNA (HSR), SCALANCE X204RNA (PRP), and SCALANCE X204RNA EEC models running affected firmware versions.
Currently, updating to the latest firmware version is the recommended approach for addressing CVE-2022-46351, as no official workarounds are provided.