PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-1074 Siemens CVE debrief

CVE-2023-1074 is a denial-of-service issue affecting Siemens SCALANCE W700 IEEE 802.11ax products. The underlying flaw is a Linux kernel Stream Control Transmission Protocol (SCTP) memory leak that can be triggered when a malicious networking service is started and a connection is made to it, allowing a local user to consume resources until service impact occurs. Siemens and CISA list 19 affected SCALANCE WAB/WAM/WUB/WUM product variants and recommend updating to V3.0.0 or later.

Vendor
Siemens
Product
SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-02-11
Original CVE updated
2025-05-06
Advisory published
2025-02-11
Advisory updated
2025-05-06

Who should care

OT/ICS operators, Siemens SCALANCE W700 administrators, and site teams responsible for Linux-based embedded appliances that permit local user activity or service execution. This matters most where the affected device is operationally critical and a local denial of service would disrupt wireless or network connectivity.

Technical summary

The source advisory describes a memory leak in the Linux kernel SCTP stack. The CVSS vector is CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (5.5, Medium), reflecting a local attack path with high availability impact and no confidentiality or integrity impact. CISA CSAF advisory ICSA-25-044-09 ties the CVE to Siemens SCALANCE W700 IEEE 802.11ax products and provides vendor remediation guidance.

Defensive priority

Medium priority. Plan remediation in the next maintenance window, and elevate scheduling if the affected device is production-critical, shared, or accessible to local users who could start services on the appliance.

Recommended defensive actions

  • Update affected Siemens SCALANCE products to V3.0.0 or later, as directed in Siemens advisory SSA-769027.
  • Inventory the listed SCALANCE WAB/WAM/WUB/WUM product variants to confirm whether any deployed units match the affected product IDs.
  • Restrict local administrative access and service execution on affected devices to reduce exposure to local abuse paths.
  • Monitor for abnormal resource consumption or service instability that could indicate a memory-leak-driven denial-of-service condition.
  • If immediate patching is not possible, apply CISA ICS defense-in-depth and recommended practices to reduce operational impact and limit unnecessary access.

Evidence notes

Primary evidence comes from the CISA CSAF advisory ICSA-25-044-09 published on 2025-02-11 and revised on 2025-05-06 with typo-only fixes. The advisory lists 19 affected Siemens products and cites remediation to V3.0.0 or later. The supplied CVE record and NVD/CVE.org links identify the same CVE, and the source description explicitly states the Linux kernel SCTP memory leak and local denial-of-service impact.

Official resources

CISA published CSAF advisory ICSA-25-044-09 on 2025-02-11 for Siemens SCALANCE W700 IEEE 802.11ax products; CISA later revised the advisory on 2025-05-06 with typo-only changes. The CVE record provided here uses the same 2025-02-11 public-p