PatchSiren cyber security CVE debrief
CVE-2023-1074 Siemens CVE debrief
CVE-2023-1074 is a denial-of-service issue affecting Siemens SCALANCE W700 IEEE 802.11ax products. The underlying flaw is a Linux kernel Stream Control Transmission Protocol (SCTP) memory leak that can be triggered when a malicious networking service is started and a connection is made to it, allowing a local user to consume resources until service impact occurs. Siemens and CISA list 19 affected SCALANCE WAB/WAM/WUB/WUM product variants and recommend updating to V3.0.0 or later.
- Vendor
- Siemens
- Product
- SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-02-11
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-02-11
- Advisory updated
- 2025-05-06
Who should care
OT/ICS operators, Siemens SCALANCE W700 administrators, and site teams responsible for Linux-based embedded appliances that permit local user activity or service execution. This matters most where the affected device is operationally critical and a local denial of service would disrupt wireless or network connectivity.
Technical summary
The source advisory describes a memory leak in the Linux kernel SCTP stack. The CVSS vector is CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (5.5, Medium), reflecting a local attack path with high availability impact and no confidentiality or integrity impact. CISA CSAF advisory ICSA-25-044-09 ties the CVE to Siemens SCALANCE W700 IEEE 802.11ax products and provides vendor remediation guidance.
Defensive priority
Medium priority. Plan remediation in the next maintenance window, and elevate scheduling if the affected device is production-critical, shared, or accessible to local users who could start services on the appliance.
Recommended defensive actions
- Update affected Siemens SCALANCE products to V3.0.0 or later, as directed in Siemens advisory SSA-769027.
- Inventory the listed SCALANCE WAB/WAM/WUB/WUM product variants to confirm whether any deployed units match the affected product IDs.
- Restrict local administrative access and service execution on affected devices to reduce exposure to local abuse paths.
- Monitor for abnormal resource consumption or service instability that could indicate a memory-leak-driven denial-of-service condition.
- If immediate patching is not possible, apply CISA ICS defense-in-depth and recommended practices to reduce operational impact and limit unnecessary access.
Evidence notes
Primary evidence comes from the CISA CSAF advisory ICSA-25-044-09 published on 2025-02-11 and revised on 2025-05-06 with typo-only fixes. The advisory lists 19 affected Siemens products and cites remediation to V3.0.0 or later. The supplied CVE record and NVD/CVE.org links identify the same CVE, and the source description explicitly states the Linux kernel SCTP memory leak and local denial-of-service impact.
Official resources
-
CVE-2023-1074 CVE record
CVE.org
-
CVE-2023-1074 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA published CSAF advisory ICSA-25-044-09 on 2025-02-11 for Siemens SCALANCE W700 IEEE 802.11ax products; CISA later revised the advisory on 2025-05-06 with typo-only changes. The CVE record provided here uses the same 2025-02-11 public-p