Feb. 13, 2024, midnight |

Siemens ProductCERT Security Advisories cert-portal.siemens.com

Affected products incorrectly validate TCP sequence numbers. This could allow an unauthenticated remote attacker to create a denial of service condition by injecting spoofed TCP RST packets.


Siemens recommends countermeasures for products where fixes are not, or not yet available.

attacker countermeasures denial of service devices fixes ip stack numbers packets products rst sequence number service siemens spoofed ssa stack tcp unauthenticated validation vulnerability

More from cert-portal.siemens.com / Siemens ProductCERT Security Advisories

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States

Information Assurance Security Specialist (IASS)

@ OBXtek Inc. | United States

Cyber Security Technology Analyst

@ Airbus | Bengaluru (Airbus)

Vice President, Cyber Operations Engineer

@ BlackRock | LO9-London - Drapers Gardens