Siemens SCALANCE S612 Firewall > 2.1 and < Multiple Vulnerabilities (SSA-268149)

critical Nessus Plugin ID 83263


The remote Siemens SCALANCE S612 firewall is affected by multiple vulnerabilities.


The Siemens SCALANCE S612 firewall device has a firmware version that is greater than 2.1 and prior to It is, therefore, affected by the following vulnerabilities :

- A brute-force weakness exists due to a failure to enforce time delays between failed login attempts. This allows a remote attacker to perform rapid, multiple authentication attempts within a short time frame.
- A stack-based buffer overflow vulnerability exists in the Profinet DCP protocol implementation due to a failure to correctly handle unexpected input. A remote attacker, using a specially crafted DCP frame, can crash the DCP protocol stack, resulting in a denial of service condition or possible arbitrary code execution.


Upgrade to firmware release or later.

See Also

Plugin Details

Severity: Critical

ID: 83263

File Name: scada_siemens_scalance_s612_SSA-268149.nbin

Version: 1.86

Type: remote

Family: SCADA

Published: 5/6/2015

Updated: 3/19/2024

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/h:siemens:scalance_s612, cpe:/a:siemens:scalance_s_firmware

Required KB Items: SCADA/Siemens SCALANCE S612 Web Server

Exploit Ease: No known exploits are available

Patch Publication Date: 4/5/2012

Vulnerability Publication Date: 4/5/2012

Reference Information

CVE: CVE-2012-1799, CVE-2012-1800

BID: 52923

ICSA: 12-102-05