Feb. 13, 2024, midnight |

Siemens ProductCERT Security Advisories cert-portal.siemens.com

Affected products incorrectly validate TCP sequence numbers. This could allow an unauthenticated remote attacker to create a denial of service condition by injecting spoofed TCP RST packets.


Siemens recommends countermeasures for products where fixes are not, or not yet available.

attacker countermeasures denial of service devices fixes ip stack numbers packets products rst sequence number service siemens spoofed ssa stack tcp unauthenticated validation vulnerability

More from cert-portal.siemens.com / Siemens ProductCERT Security Advisories

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)