Siemens SPPA-T3000 (Update A)
SPPA-T3000 Application Server and MS3000 Migration Server contain multiple vulnerabilities including unsafe deserialization (CWE-502), weak input validation (CWE-20), and insecure file upload (CWE-434) that can allow remote code execution. The Application Server listens on multiple ports (80, 8090, 8095, 8080, 1099, 5010, 8888, 7061) on the Application Highway and Automation Highway networks. According to the vendor, risk is mitigated if these highways are properly isolated from untrusted networks per the SPPA-T3000 security manual—the highways must not be exposed to external networks or the Internet.
- Network access to Application Highway or Automation Highway
- Access to one of the following ports: 80/TCP, 8090/TCP, 8095/TCP, 8080/TCP, 1099/TCP, 5010/TCP, 8888/TCP, or 7061/TCP
- No authentication required to exploit
Patching may require device reboot — plan for process interruption
/api/v1/advisories/035b55a2-b0c5-4f99-a7a1-334aed7d5d67Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.