Siemens SCALANCE S612 Firewall > 2.1 and < Multiple Vulnerabilities (SSA-268149)

Critical Nessus Plugin ID 83263


The remote Siemens SCALANCE S612 firewall is affected by multiple vulnerabilities.


The Siemens SCALANCE S612 firewall device has a firmware version that is greater than 2.1 and prior to It is, therefore, affected by the following vulnerabilities :

- A brute-force weakness exists due to a failure to enforce time delays between failed login attempts. This allows a remote attacker to perform rapid, multiple authentication attempts within a short time frame.
- A stack-based buffer overflow vulnerability exists in the Profinet DCP protocol implementation due to a failure to correctly handle unexpected input. A remote attacker, using a specially crafted DCP frame, can crash the DCP protocol stack, resulting in a denial of service condition or possible arbitrary code execution.


Upgrade to firmware release or later.

See Also

Plugin Details

Severity: Critical

ID: 83263

File Name: scada_siemens_scalance_s612_SSA-268149.nbin

Version: $Revision: 1.25 $

Type: remote

Family: SCADA

Published: 2015/05/06

Modified: 2018/01/29

Dependencies: 83264

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/h:siemens:scalance_s612, cpe:/a:siemens:scalance_s_firmware

Required KB Items: SCADA/Siemens SCALANCE S612 Web Server

Patch Publication Date: 2012/04/05

Vulnerability Publication Date: 2012/04/05

Reference Information

CVE: CVE-2012-1799, CVE-2012-1800

BID: 52923

OSVDB: 81033, 81034

ICSA: 12-102-05