PatchSiren cyber security CVE debrief
CVE-2021-3712 Siemens CVE debrief
CVE-2021-3712 is an OpenSSL ASN.1 string handling issue that can cause a read buffer overrun when code assumes ASN.1 strings are NUL-terminated but they were directly constructed without a trailing NUL. The reported impact includes application crashes and possible disclosure of private memory contents. In the Siemens/CISA advisory corpus, the issue is tied to multiple SCALANCE wireless products and is addressed by updating to V6.6.0 or later.
- Vendor
- Siemens
- Product
- SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)
- CVSS
- HIGH 7.4
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-14
- Original CVE updated
- 2026-04-21
- Advisory published
- 2026-04-14
- Advisory updated
- 2026-04-21
Who should care
Operators and maintainers of the affected Siemens SCALANCE wireless devices, OT/ICS security teams, and any application owners that rely on OpenSSL to print or process ASN.1 data from directly constructed ASN1_STRING objects.
Technical summary
OpenSSL’s ASN.1 printing and related routines can read past the end of an ASN1_STRING buffer when the code expects a terminating NUL byte that is not guaranteed for directly constructed strings or strings created with ASN1_STRING_set0(). The advisory notes that this can affect ASN.1 printing, certificate name-constraint processing, X509_get1_email(), X509_REQ_get1_email(), and X509_get1_ocsp(). The corpus states that affected OpenSSL releases were 1.1.1 through 1.1.1k and 1.0.2 through 1.0.2y, with fixes in 1.1.1l and 1.0.2za; Siemens remediates the impacted SCALANCE product set by moving to V6.6.0 or later.
Defensive priority
High for affected SCALANCE deployments. Prioritize remediation because the flaw can lead to denial of service and potential memory disclosure, and the advisory maps it to multiple industrial wireless products.
Recommended defensive actions
- Confirm whether any listed Siemens SCALANCE models are deployed in your environment and whether they are running versions earlier than V6.6.0.
- Apply Siemens’ remediation to update affected devices to V6.6.0 or later using the linked ProductCERT guidance.
- Treat the advisory as a memory-safety exposure in OpenSSL-dependent workflows and verify whether any local applications directly construct ASN1_STRING objects or use ASN1_STRING_set0().
- Reduce operational exposure for affected devices by segmenting OT networks and limiting unnecessary access to management interfaces.
- Monitor for unexpected crashes or abnormal behavior in systems that process certificates or ASN.1 data until remediation is complete.
Evidence notes
The source corpus is a CISA CSAF republication of Siemens ProductCERT advisory SSA-019200 (ICSA-26-111-07), first published on 2026-04-14 and republished on 2026-04-21. The advisory text explicitly describes a read buffer overrun in OpenSSL ASN.1 handling, cites potential crash and private-memory disclosure, and lists the Siemens SCALANCE product set plus the V6.6.0-or-later fix. The vendor mapping in the supplied metadata is marked low confidence/needs review, so the product association should be treated as advisory-backed but not independently validated here.
Official resources
-
CVE-2021-3712 CVE record
CVE.org
-
CVE-2021-3712 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA first published the advisory record on 2026-04-14 and republished it on 2026-04-21. This debrief uses those supplied advisory dates and the supplied CVE timeline for context.