Siemens SCALANCE
SCALANCE W-700 IEEE 802.11n wireless access points (all models, firmware versions before 6.6.0) contain multiple vulnerabilities including authentication bypass, input validation failures, and resource exhaustion issues (CWE-306, CWE-287, CWE-74, CWE-354, CWE-20, CWE-125, CWE-835, CWE-862, CWE-770, CWE-80). These weaknesses allow an attacker within Wi-Fi range to bypass authentication controls, inject malicious input, and potentially execute arbitrary commands on the device. Siemens has released firmware version 6.6.0 as a fix.
- Attacker must be within Wi-Fi range of the SCALANCE W-700 access point
- No valid credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ec8b4f82-3efb-49e8-ac10-10c0c50d9e49Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.