Siemens Climatix (Update A)
Siemens Climatix POL908 (BACnet/IP module) and POL909 (AWM module) are vulnerable to reflected cross-site scripting (XSS) attacks through the web interface. The vulnerabilities (CWE-79 reflected XSS and CWE-80 improper neutralization) allow an attacker to inject malicious scripts that execute in a user's browser, potentially compromising session tokens, credentials, or triggering unauthorized configuration changes. The web interface is enabled by default in some configurations and lacks authentication controls by default.
- User must access the Climatix web interface via a web browser
- Web interface must be enabled on POL908 or POL909
- User must click a malicious link or visit a crafted URL
- No authentication is enforced on the web interface (default configuration)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c233d772-3d0a-40b0-8b2e-24852e1d763fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.