Siemens SCALANCE LPE9403
MonitorCVSS 7.8ICS-CERT ICSA-25-135-18May 13, 2025
Siemens
Attack path
Attack VectorLocal
Auth RequiredLow
ComplexityLow
User InteractionNone needed
Summary
SCALANCE LPE9403 Ethernet switches (all versions) contain multiple vulnerabilities affecting confidentiality, integrity, and availability. These include insecure credential handling (CWE-319), memory corruption (CWE-121, CWE-125), privilege escalation (CWE-732), and command injection (CWE-78). Siemens has not released patches and recommends network access restrictions and adherence to Industrial Security operational guidelines until fixes are available.
What this means
What could happen
An attacker with local access to the SCALANCE LPE9403 could exploit multiple vulnerabilities to execute arbitrary code, potentially disabling network access to critical industrial equipment or stealing sensitive configuration data.
Who's at risk
This vulnerability affects the Siemens SCALANCE LPE9403, a managed industrial Ethernet switch commonly used in manufacturing plants, utility automation, and critical infrastructure networks to segment and protect process control traffic. Risk is highest for organizations running older versions of this equipment without network access controls.
How it could be exploited
An attacker with login credentials to the device could exploit local privilege escalation, memory corruption, or insecure credential handling vulnerabilities to gain unauthorized access to sensitive functions. The attack vector is local via authenticated session—requires existing user access to the management interface.
Prerequisites
- Valid user account credentials for SCALANCE LPE9403 management interface
- Local or management network access to the device
No patch availableRequires authentication to exploitAffects network access control—could block connectivity to critical equipment if compromisedLow complexity exploitation (memory corruption and privilege escalation vulnerabilities present)Local attack vector only
Exploitability
Unlikely to be exploited — EPSS score 0.4%
Affected products (1)
ProductAffected VersionsFix Status
SCALANCE LPE9403All versionsNo fix (EOL)
Remediation & Mitigation
0/5
Do now
0/2HARDENINGRestrict network access to the SCALANCE LPE9403 management interface using firewall rules; only permit connections from authorized engineering workstations and IT management systems
HARDENINGImplement strong access controls: enforce complex passwords for all user accounts and change default credentials immediately
Schedule — requires maintenance window
0/2Patching may require device reboot — plan for process interruption
HARDENINGDisable unused management protocols and services (SSH, Telnet, HTTP) if not required for operation; document which ones are active
HARDENINGMonitor device logs and network traffic to this device for suspicious authentication attempts or unusual configuration changes
Mitigations - no patch available
0/1SCALANCE LPE9403 has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGSegment the SCALANCE LPE9403 onto a dedicated management VLAN separate from production process networks to limit lateral movement if the device is compromised
CVEs (12)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/b3ac3753-3acf-4a54-ae3f-5ddd71e5df9bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.