PatchSiren cyber security CVE debrief
CVE-2020-24588 Siemens CVE debrief
CVE-2020-24588 describes a Wi-Fi integrity issue in the 802.11 handling of A-MSDU frames. In affected Siemens SCALANCE wireless devices, an attacker within Wi-Fi range may abuse the unauthenticated A-MSDU flag to inject arbitrary network packets. Siemens’ mitigation path is to update to V6.6.0 or later and, where possible, disable A-MSDU or reduce wireless exposure.
- Vendor
- Siemens
- Product
- SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)
- CVSS
- LOW 3.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-14
- Original CVE updated
- 2026-04-21
- Advisory published
- 2026-04-14
- Advisory updated
- 2026-04-21
Who should care
OT/ICS operators, network defenders, and site administrators responsible for Siemens SCALANCE wireless infrastructure should review this issue, especially where devices operate in reachable RF areas and accept non-SSP A-MSDU frames.
Technical summary
The source advisory states that the 802.11 standard does not require authentication of the A-MSDU flag in the plaintext QoS header field. Against devices that support receiving non-SSP A-MSDU frames, which is mandatory as part of 802.11n, an adversary can abuse this weakness to inject arbitrary network packets. The advisory lists multiple Siemens SCALANCE W7xx wireless models as affected when running versions earlier than V6.6.0, and identifies V6.6.0 or later as the vendor fix.
Defensive priority
Medium
Recommended defensive actions
- Upgrade affected Siemens SCALANCE devices to V6.6.0 or later, per the vendor advisory.
- Disable A-MSDU if the device and deployment allow it.
- Reduce Wi-Fi transmission power where possible to limit attack range.
- Place affected devices in private or physically controlled areas when feasible.
- Review wireless exposure for the listed SCALANCE models and prioritize systems that cannot be easily isolated.
- Validate that compensating controls and monitoring cover packet-injection risk on trusted wireless links.
Evidence notes
Timing context comes from the supplied advisory record: CISA’s ICSA-26-111-07 was published on 2026-04-14 and republished on 2026-04-21, with the source advisory attributed to Siemens ProductCERT SSA-019200. The supplied CVSS vector is CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N, matching a low-severity integrity-focused issue that requires nearby wireless access. The remediation text in the source explicitly recommends updating to V6.6.0 or later, disabling A-MSDU if possible, and reducing transmission power or using physical access controls.
Official resources
-
CVE-2020-24588 CVE record
CVE.org
-
CVE-2020-24588 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in CISA’s ICSA-26-111-07 on 2026-04-14, with a CISA republication update on 2026-04-21.