PatchSiren cyber security CVE debrief
CVE-2023-28578 Siemens CVE debrief
CVE-2023-28578 is a critical memory-corruption vulnerability in Siemens Core Services affecting multiple SCALANCE W700 device models. Siemens and CISA describe the issue as occurring while executing the command for removing a single event listener. The advisory assigns a CVSS v3.1 score of 9.3 and recommends updating affected products to V3.0.0 or later.
- Vendor
- Siemens
- Product
- SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)
- CVSS
- CRITICAL 9.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-02-11
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-02-11
- Advisory updated
- 2025-05-06
Who should care
OT and industrial network teams using Siemens SCALANCE WAB/WAM/WUB/WUM devices, especially operators, asset owners, and maintainers responsible for device firmware and access control.
Technical summary
The advisory states that Core Services can experience memory corruption when executing the command used to remove a single event listener. The supplied CVSS vector is AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H, indicating severe impact once the vulnerable path is reached. The affected product set spans 19 Siemens SCALANCE device variants listed in the CSAF advisory.
Defensive priority
Critical. Treat as a high-priority remediation for affected deployments because the issue is scored 9.3/Critical and the vendor provides a firmware update path for all listed products.
Recommended defensive actions
- Update affected Siemens SCALANCE devices to V3.0.0 or later, per the vendor remediation guidance.
- Inventory SCALANCE WAB/WAM/WUB/WUM models and confirm whether any listed product IDs are deployed.
- Restrict and monitor local or administrative access paths to affected devices until patching is complete.
- Schedule firmware updates during a controlled maintenance window and verify backups or rollback plans before changes.
- Review Siemens and CISA advisory references for model-specific guidance and any additional operational notes.
Evidence notes
Source corpus points to the CISA CSAF advisory ICSA-25-044-09 and Siemens advisory SSA-769027. The source item was published on 2025-02-11 and revised on 2025-05-06 for typo fixes only. The advisory names 19 affected Siemens SCALANCE product variants and recommends upgrading to V3.0.0 or later. The supplied enrichment indicates no KEV listing and no known ransomware campaign use.
Official resources
-
CVE-2023-28578 CVE record
CVE.org
-
CVE-2023-28578 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in the supplied CISA/Siemens source on 2025-02-11, with a later 2025-05-06 revision noted as typo fixes only.