ICSA-17-318-01_Siemens SCALANCE, SIMATIC, RUGGEDCOM, and SINAMICS Products (Update F)
Mathy Vanhoef discovered cryptographic weaknesses in the WPA2 implementation of multiple Siemens wireless and WLAN products. An attacker within RF range can perform a key recovery attack to derive the WPA2 encryption key, then decrypt and inject frames into the wireless communication. This affects SCALANCE W-700, W1750D, WLC711/712, SIMATIC RF650M/RF350M, and RUGGEDCOM ROX II devices. Certain product families and configurations are not vulnerable by default or when specific features are disabled: SCALANCE W1750D is safe unless Mesh or WiFi uplink are enabled; WLC711/712 are safe unless IEEE 802.11r, MeshConnect, or Client Bridge Mode are enabled; W-700 standalone access points, RX1400 in AP mode, and devices with iPCF features enabled are not affected. SIMATIC RF650M has no fix available.
- Attacker must be within wireless RF range of the affected WLAN device (adjacent network access)
- Target device must be actively transmitting or capable of receiving wireless frames
- High technical skill needed to execute the key recovery and frame injection attack
- Vulnerable WLAN features must be enabled (e.g., Mesh, WiFi uplink, IEEE 802.11r, MeshConnect, Client Bridge Mode on specific models)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/15afb5fd-4d8b-4f44-8b48-fe815fbb8f0eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.