PatchSiren cyber security CVE debrief
CVE-2024-6352 Schneider Electric CVE debrief
CVE-2024-6352 is a Schneider Electric Zigbee product issue that can let a malicious device joining the network trigger a buffer overflow and cause denial of service. The advisory was published on 2026-01-13 and later republished on 2026-01-27, with CISA’s CSAF notice linking the issue to multiple Schneider Electric Zigbee products, including Wiser iTRV2. The reported CVSS v3.1 score is 4.3 (Medium), reflecting adjacent-network exposure and low availability impact.
- Vendor
- Schneider Electric
- Product
- Wiser iTRV2
- CVSS
- MEDIUM 4.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-01-13
- Original CVE updated
- 2026-01-27
- Advisory published
- 2026-01-13
- Advisory updated
- 2026-01-27
Who should care
Organizations using Schneider Electric Zigbee products, especially Wiser iTRV2 deployments and any environment that allows device pairing or network onboarding, should review this advisory. OT/IoT administrators responsible for Zigbee hubs, commissioning workflows, and device enrollment controls should prioritize it.
Technical summary
The source describes a CWE-120 buffer overflow that can be triggered when a malicious device joins the network. The supplied CVSS vector is AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, which indicates an adjacent-network attack surface, no privileges or user interaction required, and availability-only impact. The advisory’s mitigation guidance focuses on tightening Zigbee pairing and key-management practices rather than providing a reboot-based workaround.
Defensive priority
Medium priority: act promptly if Zigbee onboarding is exposed, but this is not a KEV-listed issue in the supplied corpus.
Recommended defensive actions
- Do not allow unknown devices to join the Zigbee network.
- Review how the Zigbee hub manages device pairing and commissioning.
- Only open the network when adding new devices, and close it immediately afterward.
- Use install codes where possible and replace default or well-known keys with unique secure keys.
- Follow the product-specific guidance in Schneider Electric SEVD-2026-013-03 and CISA ICSA-26-027-03.
Evidence notes
All claims are based on the supplied CISA CSAF source item and its listed official references. The advisory text explicitly states a CWE-120 buffer overflow leading to denial of service when a malicious device joins the network. The CVSS vector and score are provided in the source metadata. No KEV entry or ransomware association is present in the supplied corpus. Timing references use the advisory publication and modification dates provided with the CVE record, not the CVE identifier year.
Official resources
-
CVE-2024-6352 CVE record
CVE.org
-
CVE-2024-6352 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA’s CSAF advisory (ICSA-26-027-03) shows an original release on 2026-01-13 and a republication on 2026-01-27 tied to Schneider Electric’s SEVD-2026-013-03 notice. The CVE identifier is CVE-2024-6352, but the advisory publication timeline