OTPulse

Siemens SCALANCE XCM-/XRM-300

Act Now9.8ICS-CERT ICSA-24-046-11Feb 13, 2024
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

SCALANCE XCM-/XRM-300 network switches before firmware version 2.4 contain multiple critical vulnerabilities including buffer overflows, improper input validation, weak cryptographic implementation, and broken access controls. These flaws allow unauthenticated remote attackers to execute arbitrary code on the switch, compromise device integrity, and intercept or manipulate network traffic. The vulnerability affects dozens of XCM324, XCM328, XCM332, XRH334, and XRM334 variants.

What this means
What could happen
An attacker with network access to a SCALANCE X-300 switch could execute arbitrary code remotely and completely compromise the device, allowing them to intercept, modify, or block network traffic between control systems and field devices.
Who's at risk
Water utilities, electric utilities, and other critical infrastructure operators using Siemens SCALANCE XCM or XRM network switches for industrial control system communications. These switches are commonly deployed to connect PLCs, RTUs, and SCADA workstations. Any facility relying on these switches for mission-critical process control should treat this as an urgent priority.
How it could be exploited
An attacker on the network can send a specially crafted request to the SCALANCE X-300 switch. The device fails to properly validate input due to multiple coding flaws (buffer overflows, improper bounds checking, weak cryptography). The attacker gains code execution with the device's privileges, then pivots to monitor or alter network communications.
Prerequisites
  • Network-layer access to the SCALANCE X-300 device (no authentication required)
  • Device running firmware version 2.3 or earlier
Remotely exploitable, no authentication requiredNetwork-accessible device in operational networksActively exploited in the wild (KEV status)Very high exploit probability (68.2% EPSS)Multiple underlying coding flaws increase attack surfaceAffects network infrastructure critical to process control
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (11)
11 with fix
ProductAffected VersionsFix Status
SCALANCE XCH328<V2.42.4
SCALANCE XCM324<V2.42.4
SCALANCE XCM328<V2.42.4
SCALANCE XCM332<V2.42.4
SCALANCE XRH334 (24 V DC, 8xFO, CC)<V2.42.4
SCALANCE XRM334 (230 V AC, 12xFO)<V2.42.4
SCALANCE XRM334 (230 V AC, 8xFO)<V2.42.4
SCALANCE XRM334 (24 V DC, 12xFO)<V2.42.4
Remediation & Mitigation
0/4
Do now
0/2
HOTFIXUpdate SCALANCE X-300 switches to firmware version 2.4 or later
WORKAROUNDImplement network access controls to restrict traffic to the SCALANCE X-300 management interface (e.g., firewall rules limiting access to authorized engineering workstations only)
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HARDENINGMonitor SCALANCE X-300 devices for unexpected configuration changes or management access from unauthorized sources
Long-term hardening
0/1
HARDENINGImplement network segmentation so control network switches are not directly reachable from business IT networks or the internet
CVEs (160)
CVE-2006-20001CVE-2020-10735CVE-2021-3445CVE-2021-3638CVE-2021-4037CVE-2021-36369CVE-2021-43666CVE-2021-45451CVE-2022-1015CVE-2022-1348CVE-2022-2586CVE-2022-2880CVE-2022-3294CVE-2022-3437CVE-2022-3515CVE-2022-4415CVE-2022-4743CVE-2022-4744CVE-2022-4900CVE-2022-4904CVE-2022-23471CVE-2022-23521CVE-2022-24834CVE-2022-26691CVE-2022-28737CVE-2022-28738CVE-2022-28739CVE-2022-29154CVE-2022-29162CVE-2022-29187CVE-2022-29536CVE-2022-32148CVE-2022-34903CVE-2022-34918CVE-2022-36021CVE-2022-36227CVE-2022-36760CVE-2022-37436CVE-2022-37454CVE-2022-37797CVE-2022-38725CVE-2022-39189CVE-2022-39260CVE-2022-41409CVE-2022-41556CVE-2022-41715CVE-2022-41717CVE-2022-41723CVE-2022-41860CVE-2022-41861CVE-2022-41862CVE-2022-41903CVE-2022-42919CVE-2022-44370CVE-2022-45061CVE-2022-45142CVE-2022-45919CVE-2022-46392CVE-2022-46393CVE-2022-47629CVE-2022-48303CVE-2022-48434CVE-2023-0160CVE-2023-0330CVE-2023-0361CVE-2023-0494CVE-2023-0567CVE-2023-0568CVE-2023-0590CVE-2023-0662CVE-2023-1206CVE-2023-1380CVE-2023-1393CVE-2023-1611CVE-2023-1670CVE-2023-1838CVE-2023-1855CVE-2023-1859CVE-2023-1989CVE-2023-1990CVE-2023-2002CVE-2023-2124CVE-2023-2194CVE-2023-2269CVE-2023-2861CVE-2023-2953CVE-2023-3006CVE-2023-3090CVE-2023-3111CVE-2023-3141CVE-2023-3212CVE-2023-3247CVE-2023-3268CVE-2023-3301CVE-2023-3316CVE-2023-3390CVE-2023-3611CVE-2023-3776CVE-2023-3863CVE-2023-4128CVE-2023-4194CVE-2023-20593CVE-2023-21255CVE-2023-22490CVE-2023-22742CVE-2023-22745CVE-2023-23454CVE-2023-23931CVE-2023-23934CVE-2023-23946CVE-2023-24538CVE-2023-25153CVE-2023-25155CVE-2023-25193CVE-2023-25588CVE-2023-25690CVE-2023-25727CVE-2023-26081CVE-2023-26965CVE-2023-27522CVE-2023-27534CVE-2023-27535CVE-2023-27536CVE-2023-28450CVE-2023-28466CVE-2023-28486CVE-2023-28487CVE-2023-29402CVE-2023-29404CVE-2023-29405CVE-2023-29406CVE-2023-29409CVE-2023-30086CVE-2023-30456CVE-2023-30772CVE-2023-31084CVE-2023-31124CVE-2023-31130CVE-2023-31147CVE-2023-31436CVE-2023-31489CVE-2023-32067CVE-2023-32233CVE-2023-32573CVE-2023-33203CVE-2023-34256CVE-2023-34872CVE-2023-34969CVE-2023-35001CVE-2023-35788CVE-2023-35789CVE-2023-35823CVE-2023-35824CVE-2023-35828CVE-2023-36054CVE-2023-36617CVE-2023-36664CVE-2023-37920CVE-2023-38559CVE-2023-40283
↑↓ Navigate · Esc Close
API: /api/v1/advisories/35fc8ab0-f5ab-484a-ac56-02582b65bfa6