PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-7250 Siemens CVE debrief

CVE-2023-7250 describes a denial-of-service condition in iperf used by several Siemens SCALANCE W700 product variants. According to the advisory, a malicious or malfunctioning client can send less data than expected, causing the iperf server to wait indefinitely for the remainder or until the connection closes. In an affected deployment, that hang can prevent other connections from being served. Siemens’ remediation is to update to V3.0.0 or later.

Vendor
Siemens
Product
SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0)
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-02-11
Original CVE updated
2025-05-06
Advisory published
2025-02-11
Advisory updated
2025-05-06

Who should care

Industrial network and OT administrators running the affected Siemens SCALANCE W700 models, especially if iperf-based testing services are enabled or reachable in operational environments. Teams responsible for availability of field networking gear should treat this as an uptime issue rather than a confidentiality or integrity issue.

Technical summary

The issue is a service-hang denial of service in iperf. The source advisory states that when a client sends less than the expected amount of data, the server may wait indefinitely for the rest of the transfer or until the connection is closed. That can tie up the server and block other connections. The provided CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, consistent with a network-reachable availability impact.

Defensive priority

Medium to elevated: apply the vendor fix in a planned maintenance window, because the flaw can interrupt a network test service and reduce availability on affected devices.

Recommended defensive actions

  • Update affected Siemens products to V3.0.0 or later, per the vendor remediation.
  • Confirm whether iperf functionality is enabled, exposed, or used in your deployment so you can prioritize remediation and maintenance planning.
  • If immediate patching is not possible, limit access to the service to trusted administrative networks and monitor for unexpected hangs or stalled test sessions.
  • Use standard OT defense-in-depth and availability monitoring practices to reduce the operational impact of service interruptions.

Evidence notes

The vulnerability description and remediation are taken from the CISA CSAF advisory ICSA-25-044-09 and Siemens reference SSA-769027. The source corpus lists 19 affected Siemens SCALANCE W700 product variants and recommends updating to V3.0.0 or later. The advisory revision history shows a 2025-05-06 update marked as typo fixes only, so the vulnerability substance remains the same as the 2025-02-11 publication.

Official resources

Published by the source advisory on 2025-02-11. The advisory was revised on 2025-05-06 for typo fixes only. No KEV listing was provided in the source corpus.