Siemens OpenSSL Vulnerability in Industrial Products
OpenSSL vulnerability (CVE-2024-XXXXX, CWE-125: Out-of-bounds read) affecting Siemens industrial products. The flaw is a buffer over-read in OpenSSL's certificate parsing code that could allow remote code execution or denial of service. Affects all versions of numerous SCALANCE wireless APs, switches, routers, RUGGEDCOM hardened routers, SIMATIC communication processors, S7-1200 CPU modules, Industrial Edge devices, and various software platforms. The vulnerability is triggered via specially crafted SSL/TLS handshake packets sent to the device's network interface. Siemens has released patches for some newer communication modules and software platforms (version numbers specified in remediation), but the majority of wireless access points and legacy devices have no fix planned and are permanently vulnerable.
- Network access to the device's Ethernet or wireless interface
- The device must be reachable from the attacker's network (no firewall blocking SSL/TLS ports)
- No authentication or valid credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/aae659af-b6b2-4504-b075-b08248055cb3