PatchSiren cyber security CVE debrief
CVE-2022-47069 Siemens CVE debrief
Siemens, via CISA advisory ICSA-25-044-09, reported that multiple SCALANCE W700 wireless products are affected by CVE-2022-47069, a heap-buffer-overflow in p7zip 16.02 ZIP processing. The advisory was published on 2025-02-11 and revised on 2025-05-06 for typo fixes only. Siemens recommends updating affected products to V3.0.0 or later.
- Vendor
- Siemens
- Product
- SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-02-11
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-02-11
- Advisory updated
- 2025-05-06
Who should care
OT/ICS teams operating Siemens SCALANCE WAB/WAM/WUB/WUM wireless devices, plus patch and asset-management teams responsible for archive-processing or firmware-update workflows in industrial environments.
Technical summary
The CVE description ties the issue to p7zip 16.02 and the function NArchive::NZip::CInArchive::FindCd(bool) in CPP/7zip/Archive/Zip/ZipIn.cpp, where a heap-buffer-overflow can occur while processing ZIP archives. Siemens' advisory maps the risk to 19 SCALANCE W700 product variants. The provided CVSS v3.1 vector (AV:L, AC:L, PR:N, UI:R, S:U, C:H, I:H, A:H) indicates local access and user interaction are required, but successful exploitation could have high confidentiality, integrity, and availability impact.
Defensive priority
High. The score is 7.8, the affected product set spans 19 Siemens SCALANCE variants, and a vendor fix is available. In OT environments, prioritize validation and planned maintenance because patching may require operational coordination.
Recommended defensive actions
- Inventory all listed affected SCALANCE models and confirm installed versions against Siemens guidance.
- Update to V3.0.0 or later as recommended by Siemens.
- Use approved OT change windows and validate rollback/backout plans before deployment.
- Reduce exposure of device-management hosts and archive-processing workflows; apply segmentation and defense-in-depth controls from CISA guidance.
- Monitor Siemens/CISA advisory updates and verify no site-specific exceptions remain open.
Evidence notes
Primary evidence comes from the CISA CSAF advisory ICSA-25-044-09 and Siemens security advisory SSA-769027. The source lists 19 affected SCALANCE product variants, a remediation of 'Update to V3.0.0 or later version,' and the CVSS v3.1 vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The advisory revision history shows the 2025-05-06 update fixed typos only. No KEV entry or known ransomware campaign use was provided in the source corpus.
Official resources
-
CVE-2022-47069 CVE record
CVE.org
-
CVE-2022-47069 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA and Siemens on 2025-02-11; the 2025-05-06 revision corrected typos and did not change the core vulnerability details.