Siemens Opcenter Execution Core (Update B)
Siemens Opcenter Execution Core and Camstar Enterprise Platform contain multiple input validation vulnerabilities (XSS injection, SQL injection) and authentication/authorization flaws (CWE-284, CWE-522) that allow authenticated users to execute arbitrary code or bypass access controls within the application. All versions of Camstar Enterprise Platform are affected. Opcenter Execution Core versions below 8.4 are vulnerable. The vulnerabilities permit authenticated attackers to inject malicious scripts and SQL commands to compromise data confidentiality and integrity.
- Network access to Opcenter/Camstar web server (typically port 80/443)
- Valid user credentials (engineering or operator account)
- User interaction not required once authenticated (stored XSS or direct SQL injection possible)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/acc14277-5e9b-4b76-8a03-b85af4e23cbeGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.