As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
1. EXECUTIVE SUMMARY
- CVSS v4 9.1
- ATTENTION: Exploitable remotely
- Vendor: Siemens
- Equipment: IAM Client
- Vulnerability: Improper Certificate Validation
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to perform man-in-the-middle attacks.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
- COMOS V10.6: All versions
- NX V2412: All versions prior to 2412.8700
- NX V2506: All versions prior to 2506.6000
- Simcenter 3D: All versions prior to 2506.6000
- Simcenter Femap: All versions prior to 2506.0002
- Solid Edge SE2025: All versions prior to V225.0 Update 10
- Solid Edge SE2026: All versions prior to V226.0 Update 1
3.2 VULNERABILITY OVERVIEW
3.2.1 IMPROPER CERTIFICATE VALIDATION CWE-295
The IAM client in affected products is missing server certificate validation while establishing TLS connections to the authorization server. This could allow an attacker to perform a man-in-the-middle attack.
CVE-2025-40800 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.4 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: