Siemens SCALANCE (Update A)
SCALANCE devices contain multiple vulnerabilities that allow authenticated remote attackers to execute custom code or trigger XSS conditions, and allow unauthenticated remote attackers to create denial of service conditions. Affected product lines include M-series routers (ADSL, SHDSL, mobile cellular), S-series managed switches, SC-series industrial switches, W-series wireless access points, X-series managed industrial switches, and RUGGEDCOM devices. Siemens has released patches for most affected products; however, several W-series wireless models have no fix available.
- Network access to affected SCALANCE device on ports 80/TCP or 443/TCP
- Valid administrative or user account credentials for authenticated code execution
- No special network configuration or authentication required for denial of service attacks
Patching may require device reboot — plan for process interruption
/api/v1/advisories/74d80ab8-03d3-4704-a3f7-ab78c7715b04Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.