CVE-2024-30191
📋 TL;DR
This vulnerability affects multiple Siemens SCALANCE industrial wireless access points. A physically proximate attacker can trick affected devices into associating attacker-controlled security contexts with victim frames, potentially allowing decryption of wireless traffic meant for legitimate clients. This impacts organizations using these specific Siemens industrial networking devices in their operational technology environments.
💻 Affected Systems
- SCALANCE W1748-1 M12
- SCALANCE W1788-1 M12
- SCALANCE W1788-2 EEC M12
- SCALANCE W1788-2 M12
- SCALANCE W1788-2IA M12
- SCALANCE W721-1 RJ45
- SCALANCE W722-1 RJ45
- SCALANCE W734-1 RJ45
- SCALANCE W738-1 M12
- SCALANCE W748-1 M12
- SCALANCE W748-1 RJ45
- SCALANCE W761-1 RJ45
- SCALANCE W774-1 M12 EEC
- SCALANCE W774-1 RJ45
- SCALANCE W778-1 M12
- SCALANCE W778-1 M12 EEC
- SCALANCE W786-1 RJ45
- SCALANCE W786-2 RJ45
- SCALANCE W786-2 SFP
- SCALANCE W786-2IA RJ45
- SCALANCE W788-1 M12
- SCALANCE W788-1 RJ45
- SCALANCE W788-2 M12
- SCALANCE W788-2 M12 EEC
- SCALANCE W788-2 RJ45
- SCALANCE WAM763-1
- SCALANCE WAM766-1
- SCALANCE WAM766-1 EEC
- SCALANCE WUM763-1
- SCALANCE WUM766-1
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An attacker within wireless range could decrypt sensitive industrial control system communications, potentially gaining insight into operational processes, credentials, or proprietary data transmitted over the wireless network.
Likely Case
An attacker with physical proximity to the wireless network could intercept and decrypt some wireless traffic, compromising confidentiality of industrial communications.
If Mitigated
With proper network segmentation and physical security controls, the impact is limited to the specific wireless segment, preventing lateral movement to critical systems.
🎯 Exploit Status
Exploitation requires physical proximity to the wireless network and knowledge of wireless security protocols. The vulnerability is related to previously disclosed CVE-2022-47522.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Siemens advisory for specific firmware versions
Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-457702.html
Restart Required: Yes
Instructions:
1. Review Siemens advisory SSA-457702
2. Identify affected devices in your environment
3. Download appropriate firmware updates from Siemens support portal
4. Apply firmware updates following Siemens documentation
5. Verify successful update and restart devices
🔧 Temporary Workarounds
Physical Security Enhancement
allRestrict physical access to wireless coverage areas to prevent attackers from getting within range
Network Segmentation
allIsolate wireless networks from critical control systems using firewalls and VLANs
🧯 If You Can't Patch
- Implement strict physical access controls to wireless coverage areas
- Deploy network monitoring to detect unusual wireless activity
- Consider replacing affected devices with updated models if patching is not feasible
🔍 How to Verify
Check if Vulnerable:
Check device model numbers against affected list and verify firmware version against Siemens advisory
Check Version:
Check via Siemens SCALANCE web interface or CLI: show version
Verify Fix Applied:
Verify firmware version has been updated to patched version specified in Siemens advisory
📡 Detection & Monitoring
Log Indicators:
- Multiple authentication failures
- Unusual MAC addresses attempting association
- Security context changes in wireless logs
Network Indicators:
- Unusual wireless traffic patterns
- Multiple association/disassociation events
- Suspicious wireless security negotiation attempts
SIEM Query:
wireless_device:SCALANCE AND (event_type:auth_failure OR event_type:association_anomaly)