Siemens SCALANCE W1750D (Update B)
SCALANCE W1750D contains multiple input validation and buffer overflow vulnerabilities (CWE-287, CWE-120, CWE-77, CWE-20, CWE-362, CWE-79, CWE-80, CWE-400) in the Aruba Instant command interface and web management components. Affected versions: all versions prior to 8.7.0, and versions 8.7.0 through 8.7.1.2. The vulnerabilities allow unauthenticated remote attackers to inject commands or overflow buffers via the CLI, web interface, or port 8211/UDP, potentially leading to code execution. Siemens has released firmware 8.7.1.3 to correct these issues.
- Network access to SCALANCE W1750D management interfaces (port 8211/UDP, CLI, or web interface)
- No authentication required for exploitation
- Device running firmware prior to version 8.7.0 or versions 8.7.0 through 8.7.1.2
Patching may require device reboot — plan for process interruption
/api/v1/advisories/de9dda54-8d4e-453d-8cd9-3b76a5ecf41eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.