Siemens SCALANCE W1750D Devices
The SCALANCE W1750D wireless access point contains multiple vulnerabilities in its integrated OpenSSL component (CWE-326 weak cryptography, CWE-415 and CWE-416 buffer issues, CWE-20 improper input validation). These flaws allow an attacker to read memory contents via crafted requests, decrypt RSA-encrypted messages by exploiting cryptographic weaknesses, or trigger denial of service by crashing the device. The vulnerabilities affect all regional firmware variants (JP, ROW, USA) earlier than version 8.10.0.9. Attack complexity is high, but no authentication is required and the device is network-accessible.
- Network access to SCALANCE W1750D on port 443 (HTTPS) or other network services
- Device running firmware version earlier than 8.10.0.9
- No credentials required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/da53bbd1-8ca5-40e3-8a05-c53416eb06a4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.