Third-Party Component Vulnerabilities in SCALANCE XCM332 before V2.2
Act Now9.8SSA-558014Apr 11, 2023
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
Multiple vulnerabilities in third-party components (cURL, BusyBox, libtirpc, Expat) and the Linux Kernel in SCALANCE XCM332 could allow an attacker to compromise the device's confidentiality, integrity, and availability. Affected versions: before V2.2.
What this means
What could happen
An attacker with network access could execute arbitrary code on the SCALANCE XCM332, potentially disrupting network communications, stealing sensitive data, or causing the device to fail.
Who's at risk
Industrial network operators using Siemens SCALANCE XCM332 managed switches in manufacturing plants, utilities, and critical infrastructure for network isolation and segmentation should prioritize this update. This device is commonly used as a communication gateway and network isolator in OT environments.
How it could be exploited
An attacker on the network could send malicious input to vulnerable services running on the SCALANCE XCM332 (cURL, BusyBox, or other exposed components) to trigger memory corruption, use-after-free, or race condition flaws, leading to remote code execution.
Prerequisites
- Network access to the SCALANCE XCM332
- Device running firmware version before V2.2
- No authentication required for exploitation of these third-party component vulnerabilities
remotely exploitableno authentication requiredlow complexityaffects network-critical devicemultiple unpatched third-party librarieshigh CVSS score (9.8)
Exploitability
Moderate exploit probability (EPSS 4.5%)
Affected products (1)
ProductAffected VersionsFix Status
SCALANCE XCM332< V2.22.2
Remediation & Mitigation
0/3
Schedule — requires maintenance window
0/3Patching may require device reboot — plan for process interruption
HOTFIXUpdate SCALANCE XCM332 firmware to version 2.2 or later
HARDENINGPlan firmware update during a maintenance window to avoid disruption to network traffic flowing through the switch
HARDENINGAfter update, verify network connectivity and process control system communications are functioning normally
CVEs (10)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/a9a27368-083b-46e5-b363-8bc4ffa84da0