PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-23455 Siemens CVE debrief

CVE-2023-23455 is a Linux kernel type-confusion vulnerability in atm_tc_enqueue that can result in denial of service. Siemens’ CSAF advisory ICSA-25-044-09 maps the issue to multiple SCALANCE WAB/WAM/WUB/WUM products and directs customers to update to V3.0.0 or later.

Vendor
Siemens
Product
SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-02-11
Original CVE updated
2025-05-06
Advisory published
2025-02-11
Advisory updated
2025-05-06

Who should care

OT/ICS defenders and Siemens SCALANCE operators should care, especially teams responsible for the listed WAB/WAM/WUB/WUM product lines and any environment running firmware/software versions earlier than the vendor-fixed release.

Technical summary

The flaw is described as a type confusion in net/sched/sch_atm.c: non-negative values can sometimes represent TC_ACT_SHOT rather than a valid classification result. The supplied CVSS vector (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) indicates a local, low-privilege path with primary impact to availability. Siemens’ advisory applies the CVE to 19 SCALANCE product identifiers and states the fix is V3.0.0 or later.

Defensive priority

Medium. The score is moderate, the path is local, and there is no KEV entry in the supplied timeline, but the availability impact can matter in industrial environments.

Recommended defensive actions

  • Upgrade affected Siemens SCALANCE products to V3.0.0 or later, per the vendor remediation.
  • Inventory SCALANCE WAB/WAM/WUB/WUM devices to confirm whether any listed product IDs are deployed.
  • Validate current firmware/software versions against the Siemens advisory before scheduling maintenance.
  • Apply least-privilege and restrict local administrative access on affected systems.
  • Follow CISA ICS defense-in-depth and recommended-practices guidance for segmentation, hardening, backup, and recovery planning.

Evidence notes

Primary evidence comes from the CISA CSAF source item ICSA-25-044-09 and Siemens ProductCERT references. The advisory states the CVE affects multiple Siemens SCALANCE products and that remediation is to update to V3.0.0 or later. The source revision history supplied here shows a 2025-05-06 revision for typo fixes only, not a new vulnerability date.

Official resources

Public advisory source published 2025-02-11 (ICSA-25-044-09); revised 2025-05-06 for typo fixes. No KEV date was supplied for this CVE in the provided timeline.