Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-24532
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) (All versions < V3.0.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V3.0.0), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions < V3.0.0), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V3.0.0), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions < V3.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions < V3.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V3.0.0), SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) (All versions < V3.0.0), SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V3.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions < V3.0.0), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions < V3.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V3.0.0), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions < V3.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V3.0.0). Affected devices with role `user` is affected by incorrect authorization in SNMPv3 View configuration. This could allow an attacker to change the View Type of SNMPv3 Views.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
访问控制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Siemens SCALANCE Series 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Siemens SCALANCE Series是德国西门子(Siemens)公司的一系列工业通信设备。 Siemens SCALANCE Series存在访问控制错误漏洞,该漏洞源于具有user角色的受影响设备受到SNMPv3视图配置中不正确的授权的影响。这可能允许攻击者更改SNMPv3视图的视图类型。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
SiemensSCALANCE WAB762-1 0 ~ V3.0.0 -
SiemensSCALANCE WAM763-1 0 ~ V3.0.0 -
SiemensSCALANCE WAM763-1 (ME) 0 ~ V3.0.0 -
SiemensSCALANCE WAM763-1 (US) 0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 (ME) 0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 (US) 0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 EEC 0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 EEC (ME) 0 ~ V3.0.0 -
SiemensSCALANCE WAM766-1 EEC (US) 0 ~ V3.0.0 -
SiemensSCALANCE WUB762-1 0 ~ V3.0.0 -
SiemensSCALANCE WUB762-1 iFeatures 0 ~ V3.0.0 -
SiemensSCALANCE WUM763-1 0 ~ V3.0.0 -
SiemensSCALANCE WUM763-1 0 ~ V3.0.0 -
SiemensSCALANCE WUM763-1 (US) 0 ~ V3.0.0 -
SiemensSCALANCE WUM763-1 (US) 0 ~ V3.0.0 -
SiemensSCALANCE WUM766-1 0 ~ V3.0.0 -
SiemensSCALANCE WUM766-1 (ME) 0 ~ V3.0.0 -
SiemensSCALANCE WUM766-1 (USA) 0 ~ V3.0.0 -
II. Public POCs for CVE-2025-24532
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-24532
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-24532

No comments yet


Leave a comment