Siemens SCALANCE
The SCALANCE W1750D contains multiple command injection and buffer overflow vulnerabilities (CWE-352, CWE-120, CWE-77, CWE-22, CWE-311) that allow remote code execution or denial of service without authentication. Affected versions include all versions prior to 8.7.1.3, versions 8.7.1.3 through 8.7.1.8, and version 8.7.1.9 and later (for which no fix is planned). An attacker can inject commands or trigger buffer overflows to execute arbitrary code or crash the device. Siemens recommends upgrading to patched versions where available and implementing network access controls as mitigations.
- Network access to the SCALANCE W1750D device or its management interface
- Device must be reachable from the attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/633bc257-fdd3-4ba8-8f6f-c3bd5cc508beGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.