OTPulse

Siemens Desigo Insight

Monitor5.4ICS-CERT ICSA-20-287-05Oct 13, 2020
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Siemens Desigo Insight contains SQL injection (CWE-89) and cross-site scripting (CWE-1021) vulnerabilities in its web application interface that could allow an attacker to inject malicious code or retrieve sensitive data. The vulnerability requires user interaction—specifically, an authorized user must click a malicious link or visit a compromised website while accessing the Desigo Insight Web application. An attacker could exploit this to execute arbitrary SQL queries against the underlying database or run JavaScript in the context of the web application, potentially exposing configuration data, user credentials, or enabling unauthorized modification of building automation settings.

What this means
What could happen
An attacker could inject malicious SQL or steal sensitive information from the Desigo Insight web application if a user clicks a crafted link or visits a compromised website. This could allow access to building control data and system configurations.
Who's at risk
Building automation operators and IT staff at facilities using Siemens Desigo Insight, including water treatment plants, HVAC systems, and facility management centers that rely on the web-based management interface for remote or local administration of building controls.
How it could be exploited
An attacker crafts a malicious link that contains SQL injection or cross-site scripting (XSS) payload. When a user who manages the Desigo Insight web application clicks the link from an untrusted source, the payload executes in their browser, potentially allowing the attacker to read sensitive data or modify building automation settings.
Prerequisites
  • User with access to Desigo Insight web application must click a malicious link
  • Desigo Insight Web application is enabled and accessible on the network
  • No browser-level protections or content security policies in place
Remotely exploitableUser interaction requiredLow attack complexitySQL injection and cross-site scripting riskInformation disclosure potentialWeb-based interface exposure
Exploitability
Low exploit probability (EPSS 0.3%)
Affected products (1)
ProductAffected VersionsFix Status
Desigo Insight: All versionsAll versions6.0 SP5 and apply Hotfix 2
Remediation & Mitigation
0/5
Do now
0/3
WORKAROUNDDisable Desigo Insight Web if it is not actively used for building automation management
HARDENINGRestrict web application access to only authorized users through network access controls or authentication
HARDENINGEducate users to only access Desigo Insight Web through trusted, directly-entered URLs and not via links from external sources
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Desigo Insight to version 6.0 SP5 and apply Hotfix 2 or later
Long-term hardening
0/1
HARDENINGPlace Desigo Insight on a protected IT network segment, separate from internet-facing systems and the business network
↑↓ Navigate · Esc Close
API: /api/v1/advisories/cc47e2b4-0bd1-4701-a34a-8720100b6baf
Siemens Desigo Insight | CVSS 5.4 - OTPulse