ICSA-18-128-02 Siemens Siveillance VMS (Update A)
Siemens Siveillance VMS contains a deserialization vulnerability (CWE-502) in versions 2016 R1 through 2018 R1 that allows unauthenticated remote code execution on the VMS server. An attacker can send malicious serialized objects to the server, which are deserialized without proper validation, leading to arbitrary code execution. This affects all six product versions listed. Siemens has released patched versions (V10.0a, V10.1a, V10.2b, V11.1a, V11.2a, V12.1a) and recommends immediate updates. The vulnerability requires network access to the VMS interface and moderate attacker skill to exploit due to the need to craft appropriate serialized payloads, but no public exploits are currently known.
- Network access to the Siveillance VMS web interface or API ports
- No authentication required to trigger the vulnerability
- Knowledge of the serialization format and gadget chains used by the Java application
Patching may require device reboot — plan for process interruption
/api/v1/advisories/eab86a24-954d-4a3e-9000-eaf030bca484