PatchSiren

PatchSiren cyber security CVE debrief

CVE-2022-3524 Siemens CVE debrief

CVE-2022-3524 is a remotely reachable Linux kernel issue described as a memory leak in ipv6_renew_options within the IPv6 Handler. In the Siemens/CISA advisory, the issue affects multiple SCALANCE W-series wireless products and is remediated by updating to V3.0.0 or later.

Vendor
Siemens
Product
SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-02-11
Original CVE updated
2025-05-06
Advisory published
2025-02-11
Advisory updated
2025-05-06

Who should care

Operators and defenders responsible for Siemens SCALANCE WAB/WAM/WUB/WUM devices, especially industrial networks where the affected products may be externally reachable or broadly deployed.

Technical summary

The supplied advisory corpus ties CVE-2022-3524 to a Linux kernel IPv6 Handler flaw affecting Siemens SCALANCE wireless products. The issue is described as a memory leak in ipv6_renew_options and is remotely attackable, with the published CVSS v3.1 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (5.3, Medium). Siemens lists 19 affected product variants and directs customers to update to V3.0.0 or later.

Defensive priority

Elevated for exposed or operationally critical Siemens SCALANCE deployments; otherwise moderate because the published severity is Medium.

Recommended defensive actions

  • Update affected Siemens SCALANCE products to V3.0.0 or later as directed by Siemens.
  • Inventory SCALANCE WAB/WAM/WUB/WUM deployments and verify exact model numbers against the advisory's affected product list.
  • Prioritize remediation for devices that are network-reachable or used in sensitive industrial environments.
  • Review Siemens advisory guidance and CISA industrial control system recommended practices for layered defense and exposure reduction.
  • Confirm whether compensating controls such as segmentation and access restriction are in place until patching is complete.

Evidence notes

CISA’s CSAF advisory ICSA-25-044-09 and Siemens advisory SSA-769027 identify 19 affected Siemens SCALANCE product variants and recommend updating to V3.0.0 or later. The CVE description attributes the flaw to the Linux kernel function ipv6_renew_options and states that manipulation can lead to a memory leak via remote attack. The supplied timeline shows publication on 2025-02-11 and a 2025-05-06 revision that only fixed typos.

Official resources

Publicly disclosed in CISA advisory ICSA-25-044-09 on 2025-02-11; the 2025-05-06 update in the supplied corpus was a revision for typo fixes only.