PatchSiren cyber security CVE debrief
CVE-2023-31315 Siemens CVE debrief
CVE-2023-31315 is a Siemens SCALANCE W700 advisory item published by CISA on 2025-02-11. The issue involves improper validation of a model specific register (MSR) that could let a malicious program with ring0 access modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
- Vendor
- Siemens
- Product
- SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-02-11
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-02-11
- Advisory updated
- 2025-05-06
Who should care
OT and industrial network teams running Siemens SCALANCE WAB/WAM/WUB/WUM wireless devices, especially security and operations staff responsible for firmware patching, hardening, and access control in production environments.
Technical summary
The advisory describes a high-severity flaw with CVSS 7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). An attacker with ring0 access can abuse improper MSR validation to change SMM configuration even when SMI lock is enabled, which can lead to arbitrary code execution. The affected set spans 19 Siemens SCALANCE product variants listed in the CISA CSAF advisory, and Siemens provides a fixed release path at V3.0.0 or later.
Defensive priority
High. The issue requires local, high-privilege access, but the potential impact is severe in OT environments and the affected product set is broad across Siemens SCALANCE wireless models.
Recommended defensive actions
- Upgrade affected Siemens SCALANCE devices to V3.0.0 or later, following Siemens guidance.
- Inventory deployments of the 19 affected SCALANCE product variants named in the advisory.
- Restrict administrative and kernel-level access on systems that can interact with the affected equipment.
- Apply industrial network segmentation and least-privilege controls consistent with CISA ICS recommended practices.
- Verify patch status and maintenance windows before deployment in production OT environments.
Evidence notes
Based on the CISA CSAF advisory ICSA-25-044-09 and Siemens advisory SSA-769027. The source lists 19 affected Siemens SCALANCE product variants and a vendor remediation of V3.0.0 or later. The advisory was published on 2025-02-11 and revised on 2025-05-06 for typo fixes. No Known Exploited Vulnerabilities listing is indicated in the supplied data.
Official resources
-
CVE-2023-31315 CVE record
CVE.org
-
CVE-2023-31315 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by Siemens and CISA on 2025-02-11 in advisory ICSA-25-044-09 / SSA-769027, with a CISA revision on 2025-05-06 that fixed typos.