Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
scalance_w1750d_firmware Vendor: siemens

About This Product

scalance_w1750d_firmware is a software product offered by siemens. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 62 known vulnerabilities affecting siemens scalance_w1750d_firmware. This includes 15 critical-severity issues and 23 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2017 to 2022, indicating a recent active security attention. 23 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2017-14491 2017-10-04 2025-04-20 9.8 7.5 Likely
CVE-2017-13099 2017-12-13 2025-04-20 7.5 4.3 Likely
CVE-2018-7082 2019-05-10 2024-11-21 7.2 9.0 Likely
CVE-2018-7083 2019-05-10 2024-11-21 7.5 5.0 Likely
CVE-2018-7064 2019-05-10 2024-11-21 6.1 4.3 Likely
CVE-2018-7084 2019-05-10 2024-11-21 9.8 10.0 Likely
CVE-2016-2031 2020-01-31 2024-11-21 9.8 7.5 Likely
CVE-2019-5317 2021-03-29 2024-11-21 6.8 4.6 Unknown
CVE-2020-24635 2021-03-29 2024-11-21 7.2 9.0 Likely
CVE-2020-24636 2021-03-29 2024-11-21 9.8 10.0 Likely
CVE-2021-25143 2021-03-29 2024-11-21 7.5 5.0 Likely
CVE-2021-25144 2021-03-29 2024-11-21 8.8 9.0 Likely
CVE-2021-25145 2021-03-30 2024-11-21 6.5 3.3 Unknown
CVE-2021-25148 2021-03-30 2024-11-21 8.1 8.5 Likely
CVE-2021-25149 2021-03-30 2024-11-21 9.8 7.5 Likely
CVE-2021-25146 2021-03-30 2024-11-21 7.2 9.0 Likely
CVE-2021-25150 2021-03-30 2024-11-21 8.8 9.0 Likely
CVE-2021-25155 2021-03-30 2024-11-21 6.5 8.5 Likely
CVE-2019-5319 2021-03-30 2024-11-21 9.8 10.0 Likely
CVE-2021-25156 2021-03-30 2024-11-21 4.9 4.0 Likely
CVE-2021-25157 2021-03-30 2024-11-21 4.9 4.0 Likely
CVE-2021-25158 2021-03-30 2024-11-21 5.9 4.3 Likely
CVE-2021-25159 2021-03-30 2024-11-21 6.5 8.5 Likely
CVE-2021-25160 2021-03-30 2024-11-21 4.9 4.0 Likely
CVE-2021-25161 2021-03-30 2024-11-21 6.1 4.3 Likely
CVE-2021-25162 2021-03-30 2024-11-21 8.1 9.3 Likely
CVE-2020-24588 2021-05-11 2024-11-21 3.5 2.9 Unknown
CVE-2020-26140 2021-05-11 2024-11-21 6.5 3.3 Unknown
CVE-2020-26146 2021-05-11 2024-11-21 5.3 2.9 Unknown
CVE-2019-5318 2021-09-07 2024-11-21 6.5 7.1 Likely
CVE-2021-37716 2021-09-07 2024-11-21 9.8 10.0 Likely
CVE-2021-37717 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37718 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37720 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37721 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37722 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37723 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37724 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37725 2021-09-07 2024-11-21 8.1 8.8 Likely
CVE-2021-37728 2021-09-07 2024-11-21 6.5 8.5 Likely
CVE-2021-37729 2021-09-07 2024-11-21 6.5 5.5 Likely
CVE-2021-37731 2021-09-07 2024-11-21 6.2 7.2 Unknown
CVE-2021-37733 2021-09-07 2024-11-21 4.9 4.0 Likely
CVE-2021-37726 2021-10-12 2024-11-21 9.8 10.0 Likely
CVE-2021-37727 2021-10-12 2024-11-21 7.2 9.0 Likely
CVE-2021-37730 2021-10-12 2024-11-21 7.2 9.0 Likely
CVE-2021-37732 2021-10-12 2024-11-21 7.2 9.0 Likely
CVE-2021-37734 2021-10-12 2024-11-21 6.5 4.0 Likely
CVE-2021-37735 2021-10-12 2024-11-21 5.3 5.0 Likely
CVE-2002-20001 2021-11-11 2025-08-22 7.5 5.0 Likely
CVE-2022-37888 2022-10-06 2024-11-21 9.8 - -
CVE-2022-37885 2022-10-07 2024-11-21 9.8 - -
CVE-2022-37886 2022-10-07 2024-11-21 9.8 - -
CVE-2022-37887 2022-10-07 2024-11-21 9.8 - -
CVE-2022-37889 2022-10-07 2024-11-21 9.8 - -
CVE-2022-37890 2022-10-07 2024-11-21 9.8 - -
CVE-2022-37891 2022-10-07 2024-11-21 9.8 - -
CVE-2022-37892 2022-10-07 2024-11-21 5.4 - -
CVE-2022-37893 2022-10-07 2024-11-21 7.8 - -
CVE-2022-37894 2022-10-07 2024-11-21 6.5 - -
CVE-2022-37895 2022-10-07 2024-11-21 4.9 - -
CVE-2022-37896 2022-10-07 2024-11-21 6.1 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for siemens scalance_w1750d_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.