Siemens SCALANCE SC-600 Family
Multiple vulnerabilities in third-party firmware components of the SCALANCE SC-600 family managed switches (CWE-787 out-of-bounds write, CWE-416 use-after-free, CWE-770 allocation with excessive size) could allow local attackers to cause denial of service, corrupt memory, or execute arbitrary code. The SC-600 series is a key network appliance in industrial control system architectures, used to segregate and manage traffic between engineering networks and operational technology networks. All versions before 3.0 are affected.
- Physical or logical local access to SCALANCE SC-600 device
- Device running firmware version below 3.0
- No administrative credentials required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ea1b5b0a-b7c9-4d93-b0ce-a30c4eab17abGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.