Siemens SCALANCE W1750D
The SCALANCE W1750D wireless access point is vulnerable to Wi-Fi encryption bypass attacks known as "Framing Frames" that allow attackers within Wi-Fi range to decrypt and intercept traffic, potentially disclosing sensitive information or stealing user sessions. The vulnerability affects all regional variants (JP, ROW, USA) in firmware versions prior to 8.10.0.6. Siemens has released firmware updates to address the issue. The vulnerability is not remotely exploitable and requires the attacker to be physically near the device, but no public exploit is available yet.
- Physical proximity to the SCALANCE W1750D (within Wi-Fi broadcast range)
- Attacker must have basic Wi-Fi sniffing tools
- Device must be operating with affected firmware version below 8.10.0.6
Patching may require device reboot — plan for process interruption
/api/v1/advisories/74456c68-fa89-41ad-8488-8fe16b85d1ebGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.