CVE-2025-24499

7.2 HIGH

📋 TL;DR

This vulnerability in Siemens SCALANCE industrial wireless devices allows authenticated remote attackers to execute arbitrary shell commands by exploiting improper input validation when loading configuration files. It affects multiple SCALANCE WAB, WAM, and WUB series devices running versions below V3.0.0. Organizations using these industrial networking devices in operational technology environments are at risk.

💻 Affected Systems

Products:
  • SCALANCE WAB762-1
  • SCALANCE WAM763-1
  • SCALANCE WAM763-1 (ME)
  • SCALANCE WAM763-1 (US)
  • SCALANCE WAM766-1
  • SCALANCE WAM766-1 (ME)
  • SCALANCE WAM766-1 (US)
  • SCALANCE WAM766-1 EEC
  • SCALANCE WAM766-1 EEC (ME)
  • SCALANCE WAM766-1 EEC (US)
  • SCALANCE WUB762-1
  • SCALANCE WUB762-1 iFeatures
  • SCALANCE WUM763-1
  • SCALANCE WUM763-1 (US)
  • SCALANCE WUM766-1
  • SCALANCE WUM766-1 (ME)
  • SCALANCE WUM766-1 (USA)
Versions: All versions < V3.0.0
Operating Systems: Embedded firmware on affected devices
Default Config Vulnerable: ⚠️ Yes
Notes: All listed product variants with specified part numbers are affected. Requires authenticated access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to disruption of industrial operations, lateral movement within OT networks, or manipulation of industrial processes.

🟠

Likely Case

Unauthorized access to device configuration, network reconnaissance, or installation of persistent backdoors in industrial networks.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring in place.

🌐 Internet-Facing: HIGH - If devices are exposed to the internet, attackers could gain shell access to industrial network infrastructure.
🏢 Internal Only: MEDIUM - Requires authenticated access but could be exploited by malicious insiders or through credential compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to the device's configuration interface. Attack complexity is reduced if default credentials are in use or authentication is weak.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.0.0 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-769027.html

Restart Required: No

Instructions:

1. Download firmware V3.0.0 or later from Siemens Industrial Security website. 2. Backup current device configuration. 3. Upload and install new firmware via web interface or management tool. 4. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Restrict Configuration File Access

all

Limit who can upload configuration files to only authorized administrators using strong authentication.

Network Segmentation

all

Isolate SCALANCE devices in separate VLANs with strict firewall rules limiting access to management interfaces.

🧯 If You Can't Patch

  • Implement strict access controls with multi-factor authentication for device management interfaces.
  • Monitor network traffic to/from SCALANCE devices for unusual configuration uploads or command execution patterns.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI. If version is below V3.0.0, device is vulnerable.

Check Version:

Via web interface: Navigate to System > Device Information. Via CLI: Use 'show version' or similar command depending on device model.

Verify Fix Applied:

Confirm firmware version is V3.0.0 or higher after update. Test configuration upload functionality with malformed files to ensure proper validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual configuration file uploads
  • Multiple failed authentication attempts followed by successful login
  • Shell command execution in device logs

Network Indicators:

  • Unexpected outbound connections from SCALANCE devices
  • Traffic to/from management interfaces from unauthorized IPs

SIEM Query:

source="scalance_device" AND (event="config_upload" OR event="shell_exec")

🔗 References

📤 Share & Export