A vulnerability, which was classified as problematic, has been found in Siemens SCALANCE W721-1 RJ45, SCALANCE W722-1 RJ45, SCALANCE W734-1 RJ45, SCALANCE W734-1 RJ45, SCALANCE W738-1 M12, SCALANCE W748-1 M12, SCALANCE W748-1 RJ45, SCALANCE W761-1 RJ45, SCALANCE W774-1 M12 EEC, SCALANCE W774-1 RJ45, SCALANCE W774-1 RJ45, SCALANCE W778-1 M12, SCALANCE W778-1 M12 EEC, SCALANCE W778-1 M12 EEC, SCALANCE W786-1 RJ45, SCALANCE W786-2 RJ45, SCALANCE W786-2 SFP, SCALANCE W786-2IA RJ45, SCALANCE W788-1 M12, SCALANCE W788-1 RJ45, SCALANCE W788-2 M12, SCALANCE W788-2 M12 EEC and SCALANCE W788-2 RJ45. This issue affects some unknown processing of the component Wi-Fi Queue Handler. The manipulation leads to authentication bypass by spoofing.

The identification of this vulnerability is CVE-2024-30189. The attack can only be done within the local network. There is no exploit available.