Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Siemens SCALANCE W700 Vulnerability: Update Now or Risk Remote Code Injection!
As of January 10, 2023, CISA will no longer update ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the latest on Siemens vulnerabilities, visit Siemens’ ProductCERT Security Advisories. Remember, if you can’t secure your SCALANCE W700, it’s like leaving your front…

Hot Take:
Looks like Siemens’ SCALANCE W700 series has more holes than Swiss cheese, and CISA’s decided to leave the cheese grating to Siemens from now on. Who knew industrial control systems could be so… vulnerable?
Key Points:
- CISA will no longer update ICS security advisories for Siemens product vulnerabilities beyond the initial advisory.
- High-risk vulnerability (CVSS v4 score 9.4) in Siemens SCALANCE W700 802.11 AX family products.
- Vulnerability allows remote code injection or system root shell access.
- Siemens recommends updating to version V2.4.0 or later to mitigate the issue.
- Key sectors affected include Chemical, Critical Manufacturing, and Energy.