PatchSiren

PatchSiren cyber security CVE debrief

CVE-2020-26140 Siemens CVE debrief

CVE-2020-26140 is a wireless integrity flaw described in the supplied CISA/Siemens advisory material: protected Wi-Fi implementations accept plaintext frames, which can let an attacker within Wi-Fi range inject arbitrary data frames even when the network is configured for WEP, WPA, WPA2, or WPA3. The advisory rates the issue CVSS 6.5 (medium) and recommends updating affected devices to V6.6.0 or later. If immediate updating is not possible, Siemens advises reducing Wi-Fi transmission power and using physical access controls. The source corpus also contains a conflicting product description outside the Siemens advisory family, so the exact affected product mapping should be verified before remediation work is scheduled.

Vendor
Siemens
Product
SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-04-14
Original CVE updated
2026-04-21
Advisory published
2026-04-14
Advisory updated
2026-04-21

Who should care

Operators and maintainers of Siemens SCALANCE wireless deployments, OT/ICS network defenders, and asset owners responsible for Wi-Fi-capable industrial devices that may be reachable from outside controlled areas.

Technical summary

The primary advisory source (ICSA-26-111-07 / Siemens ProductCERT SSA-019200 as republished by CISA) describes a flaw where WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. That behavior allows an adversary within radio range to inject arbitrary data frames regardless of the intended wireless protection settings. The supplied CVSS vector is AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N, indicating adjacent-network access, no privileges, no user interaction, and integrity impact as the main consequence. The listed vendor fix is V6.6.0 or later, with interim exposure reduction via lower transmission power and physical access controls.

Defensive priority

Medium priority, but treat as urgent for any exposed wireless OT deployment: the issue is reachable from adjacent Wi-Fi range and can affect message integrity without authentication or user interaction.

Recommended defensive actions

  • Confirm whether your environment uses any of the Siemens SCALANCE wireless models listed in the advisory and verify the installed firmware/software version.
  • Upgrade affected devices to V6.6.0 or later using the Siemens remediation guidance.
  • If you cannot patch immediately, reduce Wi-Fi transmission power and place devices in private areas with physical access controls, as recommended by the advisory.
  • Review wireless trust boundaries and segmentation so that nearby attackers cannot reach operational traffic paths even if radio access is possible.
  • Validate the exact affected product mapping before change execution, because the supplied corpus contains conflicting product attribution and should be reviewed carefully.

Evidence notes

The debrief follows the supplied CISA CSAF source and Siemens references. The corpus includes a notable inconsistency: the top-level CVE description text names an ALFA Windows 10 driver for AWUS036H, while the CISA/Siemens advisory material in the source item and references tracks Siemens SCALANCE wireless products and a fix to V6.6.0 or later. This output prioritizes the cited advisory family and flags the mismatch for review. Published date used here is the supplied CVE publication date of 2026-04-14; the 2026-04-21 timestamp reflects republication/modification context, not a separate issue date.

Official resources

CVE published 2026-04-14 and republished by CISA on 2026-04-21 as ICSA-26-111-07; no Known Exploited Vulnerabilities listing was supplied.