CVE-2022-46144: CWE-664: Improper Control of a Resource Through its Lifetime in Siemens SCALANCE SC622-2C
A vulnerability has been identified in SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V2.3), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V2.3), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V2.3), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V2.3), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V2.3), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V2.3), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V2.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V2.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V2.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V2.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V2.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V2.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V2.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V2.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V2.0.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive.
AI Analysis
Technical Summary
CVE-2022-46144 is a vulnerability identified in multiple Siemens SCALANCE industrial network devices, specifically models SC622-2C, SC626-2C, SC632-2C, SC636-2C, SC642-2C, SC646-2C, WAM763-1, WAM766-1 (including US and EEC variants), and WUM763-1, WUM766-1 (including USA variants). These devices are widely used in industrial control systems (ICS) and critical infrastructure networks for secure communication and network segmentation. The vulnerability arises from improper control of a resource through its lifetime (CWE-664). Specifically, the affected devices do not correctly handle command-line interface (CLI) commands after a user forcefully terminates an SSH session. This improper resource management can cause the CLI accessed via SSH or serial interface to become unresponsive. The issue affects all firmware versions prior to V2.3 or V3.0 depending on the device model, and for some wireless models, all versions prior to V2.0.0. Exploitation requires an authenticated attacker with access to the device's CLI via SSH or serial interface. Although no public exploits are currently known, successful exploitation could disrupt device management and network operations by rendering the CLI unresponsive, potentially impacting the availability and maintainability of critical network infrastructure. Siemens has not yet published patches or mitigations at the time of this report. The vulnerability was published on December 13, 2022, and is classified under CWE-664, indicating a failure to properly manage resource lifetimes leading to potential denial of service conditions.
Potential Impact
For European organizations, especially those operating critical infrastructure such as energy grids, manufacturing plants, transportation networks, and utilities, this vulnerability poses a significant risk to operational continuity. Siemens SCALANCE devices are commonly deployed in industrial environments across Europe for secure and reliable network communication. An attacker with authenticated access could exploit this vulnerability to cause denial of service by making the CLI unresponsive, thereby preventing administrators from managing or troubleshooting the affected devices. This could delay incident response, complicate network reconfiguration, and potentially lead to extended downtime or degraded network segmentation, increasing exposure to further attacks. The impact on confidentiality and integrity is limited as exploitation requires authentication and does not directly enable data exfiltration or manipulation. However, the availability impact is notable, as loss of CLI access can hinder operational control and recovery efforts. Given the critical role of these devices in industrial networks, even temporary disruptions can have cascading effects on production processes and safety systems. The lack of known exploits reduces immediate risk, but the vulnerability remains a concern for organizations with Siemens SCALANCE devices in their operational technology (OT) environments.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting authenticated access to the affected devices. Implement strict access controls, including multi-factor authentication and network segmentation, to limit CLI access to trusted personnel only. 2. Monitor SSH session terminations and CLI responsiveness closely to detect abnormal behavior indicative of exploitation attempts. 3. Where possible, avoid forcefully terminating SSH sessions; instead, use proper session closure procedures to prevent triggering the vulnerability. 4. Maintain up-to-date backups of device configurations to enable rapid recovery if CLI access is lost. 5. Engage with Siemens support channels to obtain official patches or firmware updates as they become available and prioritize their deployment. 6. Consider deploying network-level protections such as intrusion detection systems (IDS) tuned to detect anomalous SSH session behaviors targeting SCALANCE devices. 7. Conduct regular security audits and penetration testing focused on OT network devices to identify and remediate similar resource management issues proactively. 8. Document and train operational staff on incident response procedures specific to loss of CLI access to minimize downtime during exploitation scenarios.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2022-46144: CWE-664: Improper Control of a Resource Through its Lifetime in Siemens SCALANCE SC622-2C
Description
A vulnerability has been identified in SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V2.3), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V2.3), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V2.3), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V2.3), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V2.3), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V2.3), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V2.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V2.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V2.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V2.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V2.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V2.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V2.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V2.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V2.0.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive.
AI-Powered Analysis
Technical Analysis
CVE-2022-46144 is a vulnerability identified in multiple Siemens SCALANCE industrial network devices, specifically models SC622-2C, SC626-2C, SC632-2C, SC636-2C, SC642-2C, SC646-2C, WAM763-1, WAM766-1 (including US and EEC variants), and WUM763-1, WUM766-1 (including USA variants). These devices are widely used in industrial control systems (ICS) and critical infrastructure networks for secure communication and network segmentation. The vulnerability arises from improper control of a resource through its lifetime (CWE-664). Specifically, the affected devices do not correctly handle command-line interface (CLI) commands after a user forcefully terminates an SSH session. This improper resource management can cause the CLI accessed via SSH or serial interface to become unresponsive. The issue affects all firmware versions prior to V2.3 or V3.0 depending on the device model, and for some wireless models, all versions prior to V2.0.0. Exploitation requires an authenticated attacker with access to the device's CLI via SSH or serial interface. Although no public exploits are currently known, successful exploitation could disrupt device management and network operations by rendering the CLI unresponsive, potentially impacting the availability and maintainability of critical network infrastructure. Siemens has not yet published patches or mitigations at the time of this report. The vulnerability was published on December 13, 2022, and is classified under CWE-664, indicating a failure to properly manage resource lifetimes leading to potential denial of service conditions.
Potential Impact
For European organizations, especially those operating critical infrastructure such as energy grids, manufacturing plants, transportation networks, and utilities, this vulnerability poses a significant risk to operational continuity. Siemens SCALANCE devices are commonly deployed in industrial environments across Europe for secure and reliable network communication. An attacker with authenticated access could exploit this vulnerability to cause denial of service by making the CLI unresponsive, thereby preventing administrators from managing or troubleshooting the affected devices. This could delay incident response, complicate network reconfiguration, and potentially lead to extended downtime or degraded network segmentation, increasing exposure to further attacks. The impact on confidentiality and integrity is limited as exploitation requires authentication and does not directly enable data exfiltration or manipulation. However, the availability impact is notable, as loss of CLI access can hinder operational control and recovery efforts. Given the critical role of these devices in industrial networks, even temporary disruptions can have cascading effects on production processes and safety systems. The lack of known exploits reduces immediate risk, but the vulnerability remains a concern for organizations with Siemens SCALANCE devices in their operational technology (OT) environments.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting authenticated access to the affected devices. Implement strict access controls, including multi-factor authentication and network segmentation, to limit CLI access to trusted personnel only. 2. Monitor SSH session terminations and CLI responsiveness closely to detect abnormal behavior indicative of exploitation attempts. 3. Where possible, avoid forcefully terminating SSH sessions; instead, use proper session closure procedures to prevent triggering the vulnerability. 4. Maintain up-to-date backups of device configurations to enable rapid recovery if CLI access is lost. 5. Engage with Siemens support channels to obtain official patches or firmware updates as they become available and prioritize their deployment. 6. Consider deploying network-level protections such as intrusion detection systems (IDS) tuned to detect anomalous SSH session behaviors targeting SCALANCE devices. 7. Conduct regular security audits and penetration testing focused on OT network devices to identify and remediate similar resource management issues proactively. 8. Document and train operational staff on incident response procedures specific to loss of CLI access to minimize downtime during exploitation scenarios.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2022-11-28T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d984bc4522896dcbf82e2
Added to database: 5/21/2025, 9:09:31 AM
Last enriched: 6/20/2025, 11:03:52 AM
Last updated: 8/11/2025, 9:45:26 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.