Skip to main content

CVE-2022-46144: CWE-664: Improper Control of a Resource Through its Lifetime in Siemens SCALANCE SC622-2C

Medium
Published: Tue Dec 13 2022 (12/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Siemens
Product: SCALANCE SC622-2C

Description

A vulnerability has been identified in SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V2.3), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V2.3), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V2.3), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V2.3), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V2.3), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V2.3), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions < V2.0.0), SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) (All versions < V2.0.0), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions < V2.0.0), SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) (All versions < V2.0.0), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions < V2.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions < V2.0.0), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions < V2.0.0), SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) (All versions < V2.0.0), SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) (All versions < V2.0.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive.

AI-Powered Analysis

AILast updated: 06/20/2025, 11:03:52 UTC

Technical Analysis

CVE-2022-46144 is a vulnerability identified in multiple Siemens SCALANCE industrial network devices, specifically models SC622-2C, SC626-2C, SC632-2C, SC636-2C, SC642-2C, SC646-2C, WAM763-1, WAM766-1 (including US and EEC variants), and WUM763-1, WUM766-1 (including USA variants). These devices are widely used in industrial control systems (ICS) and critical infrastructure networks for secure communication and network segmentation. The vulnerability arises from improper control of a resource through its lifetime (CWE-664). Specifically, the affected devices do not correctly handle command-line interface (CLI) commands after a user forcefully terminates an SSH session. This improper resource management can cause the CLI accessed via SSH or serial interface to become unresponsive. The issue affects all firmware versions prior to V2.3 or V3.0 depending on the device model, and for some wireless models, all versions prior to V2.0.0. Exploitation requires an authenticated attacker with access to the device's CLI via SSH or serial interface. Although no public exploits are currently known, successful exploitation could disrupt device management and network operations by rendering the CLI unresponsive, potentially impacting the availability and maintainability of critical network infrastructure. Siemens has not yet published patches or mitigations at the time of this report. The vulnerability was published on December 13, 2022, and is classified under CWE-664, indicating a failure to properly manage resource lifetimes leading to potential denial of service conditions.

Potential Impact

For European organizations, especially those operating critical infrastructure such as energy grids, manufacturing plants, transportation networks, and utilities, this vulnerability poses a significant risk to operational continuity. Siemens SCALANCE devices are commonly deployed in industrial environments across Europe for secure and reliable network communication. An attacker with authenticated access could exploit this vulnerability to cause denial of service by making the CLI unresponsive, thereby preventing administrators from managing or troubleshooting the affected devices. This could delay incident response, complicate network reconfiguration, and potentially lead to extended downtime or degraded network segmentation, increasing exposure to further attacks. The impact on confidentiality and integrity is limited as exploitation requires authentication and does not directly enable data exfiltration or manipulation. However, the availability impact is notable, as loss of CLI access can hinder operational control and recovery efforts. Given the critical role of these devices in industrial networks, even temporary disruptions can have cascading effects on production processes and safety systems. The lack of known exploits reduces immediate risk, but the vulnerability remains a concern for organizations with Siemens SCALANCE devices in their operational technology (OT) environments.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting authenticated access to the affected devices. Implement strict access controls, including multi-factor authentication and network segmentation, to limit CLI access to trusted personnel only. 2. Monitor SSH session terminations and CLI responsiveness closely to detect abnormal behavior indicative of exploitation attempts. 3. Where possible, avoid forcefully terminating SSH sessions; instead, use proper session closure procedures to prevent triggering the vulnerability. 4. Maintain up-to-date backups of device configurations to enable rapid recovery if CLI access is lost. 5. Engage with Siemens support channels to obtain official patches or firmware updates as they become available and prioritize their deployment. 6. Consider deploying network-level protections such as intrusion detection systems (IDS) tuned to detect anomalous SSH session behaviors targeting SCALANCE devices. 7. Conduct regular security audits and penetration testing focused on OT network devices to identify and remediate similar resource management issues proactively. 8. Document and train operational staff on incident response procedures specific to loss of CLI access to minimize downtime during exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2022-11-28T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984bc4522896dcbf82e2

Added to database: 5/21/2025, 9:09:31 AM

Last enriched: 6/20/2025, 11:03:52 AM

Last updated: 8/11/2025, 9:45:26 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats