Siemens IAM Client

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 9.1
  • ATTENTION: Exploitable remotely
  • Vendor: Siemens
  • Equipment: IAM Client
  • Vulnerability: Improper Certificate Validation

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to perform man-in-the-middle attacks.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Siemens reports that the following products are affected:

  • COMOS V10.6: All versions
  • NX V2412: All versions prior to 2412.8700
  • NX V2506: All versions prior to 2506.6000
  • Simcenter 3D: All versions prior to 2506.6000
  • Simcenter Femap: All versions prior to 2506.0002
  • Solid Edge SE2025: All versions prior to V225.0 Update 10
  • Solid Edge SE2026: All versions prior to V226.0 Update 1

3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER CERTIFICATE VALIDATION CWE-295

The IAM client in affected products is missing server certificate validation while establishing TLS connections to the authorization server. This could allow an attacker to perform a man-in-the-middle attack.

CVE-2025-40800 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.4 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from All CISA Advisories

Read the original article: