Siemens SCALANCE W700 IEEE 802.11ax

Act NowCVSS 9.8ICS-CERT ICSA-25-044-09Feb 11, 2025
Siemens
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

SCALANCE W700 IEEE 802.11ax wireless access points contain multiple critical vulnerabilities including weak authentication, poor encryption, insecure deserialization, memory corruption, and unsafe input handling. These flaws allow remote attackers without credentials to execute arbitrary code, bypass security controls, or disrupt wireless communications. All models of SCALANCE WAB, WAM, WUB, and WUM series with firmware earlier than version 3.0.0 are affected. Siemens has released firmware version 3.0.0 or later to remediate these issues.

What this means
What could happen
An attacker with network access to these wireless access points could remotely execute arbitrary code or bypass authentication, potentially disrupting communications to critical field devices or taking control of the wireless network infrastructure used to manage industrial operations.
Who's at risk
Water utilities and municipal electric systems using Siemens SCALANCE W700 IEEE 802.11ax wireless access points for field device communications or engineering workstation connections. This includes SCALANCE WAB, WAM, WUB, and WUM series models deployed as wireless infrastructure for SCADA, HMI, or remote PLC access.
How it could be exploited
An attacker on the same network (or routable to it) could send a crafted request or exploit weak authentication/encryption mechanisms in the 802.11ax wireless firmware to execute commands on the access point. This could allow them to intercept, modify, or block communications between engineering workstations, PLCs, RTUs, and other control devices relying on the wireless network.
Prerequisites
  • Network connectivity to the SCALANCE W700 device (wired or wireless)
  • No authentication required for the majority of the identified vulnerabilities
remotely exploitableno authentication requiredlow complexityhigh EPSS score (88.5%)affects network infrastructure critical to operations
Exploitability
Likely to be exploited — EPSS score 88.4%
Public Proof-of-Concept (PoC) on GitHub (10 repositories)
Affected products (17)
17 with fix
ProductAffected VersionsFix Status
SCALANCE WAB762-1<V3.0.03.0.0
SCALANCE WAM763-1<V3.0.03.0.0
SCALANCE WAM763-1 (ME)<V3.0.03.0.0
SCALANCE WAM763-1 (US)<V3.0.03.0.0
SCALANCE WAM766-1<V3.0.03.0.0
Remediation & Mitigation
0/4
Do now
0/1
WORKAROUNDRestrict network access to SCALANCE W700 devices using firewall rules to block direct access from untrusted networks
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate all SCALANCE W700 series devices to firmware version 3.0.0 or later
Long-term hardening
0/2
HARDENINGIf remote management is required, implement VPN access to reach the devices instead of direct network exposure
HARDENINGIsolate the wireless network infrastructure (SCALANCE W700 devices) from business networks using separate VLAN segmentation
CVEs (72)
API: /api/v1/advisories/8fba238d-1009-46d2-8cd0-194d6c519ec0

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.

Siemens SCALANCE W700 IEEE 802.11ax | CVSS 9.8 - OTPulse