VYPR
Medium severity6.5NVD Advisory· Published May 13, 2025· Updated Apr 15, 2026

CVE-2025-24510

CVE-2025-24510

Description

A vulnerability has been identified in MS/TP Point Pickup Module (All versions). Affected devices improperly handle specific incoming BACnet MSTP messages. This could allow an attacker residing in the same BACnet network to send a specially crafted MSTP message that results in a denial of service condition of the targeted device. A power cycle is required to restore the device's normal operation.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An improper handling of specially crafted BACnet MSTP messages in Siemens MS/TP Point Pickup Module allows network-adjacent attackers to cause a denial of service requiring a power cycle.

Vulnerability

Details

The Siemens MS/TP Point Pickup Module in all versions is affected by a denial of service vulnerability (CVE-2025-24510). The root cause is improper handling of specific incoming BACnet MSTP messages. This programming flaw means the device does not correctly validate or process certain MSTP frames, leading to a fault condition when a malicious packet arrives. [1]

Exploitation

An attacker must be on the same BACnet network as the targeted MS/TP Point Pickup Module. No authentication or prior interaction is required – the attacker only needs to send a specially crafted MSTP message to the device. The attack does not require a privileged network position as long as the attacker can communicate over the BACnet MSTP protocol. [1]

Impact

Once the crafted message is processed, the affected module enters a denial of service state. The device becomes unresponsive and stops performing its normal functions. To restore normal operation, a manual power cycle must be performed. There is no mention of data leakage or code execution; the impact is limited to availability. [1]

Mitigation

As of the publication date (2025-05-13), no fix is planned for this vulnerability. Siemens recommends following general security recommendations for BACnet networks, such as network segmentation, monitoring, and restricting access to the MSTP segment. Until a fix becomes available, administrators should rely on workarounds that prevent untrusted devices from sending MSTP messages to the module. [1]

References
  1. SSA-668154

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.