Siemens SCALANCE W700 and W1700
Siemens SCALANCE W700 and W1700 wireless network switches contain a weakness in WPA/WPA2 encryption implementation. When configured to use TKIP cipher instead of the more secure AES-CCMP, the switches allow attackers within wireless range to decrypt network traffic. The vulnerability does not affect switch operation itself, but can expose management traffic, credentials, or control system communications. Siemens recommends updating to firmware v6.4 (W700) or v1.1 (W1700) or switching to AES-CCMP encryption as an immediate mitigation.
- Wireless network access within range of the SCALANCE switch
- WPA/WPA2 network configured with TKIP cipher (not the more secure AES-CCMP)
- Physical or proximate presence to the facility
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cb58fc97-038a-40d3-90e5-b8c02aa39ea3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.