Siemens Desigo CC Family
Desigo CC, Desigo CC Compact, and Cerberus DMS contain an unsafe deserialization vulnerability in the CCOM communication component hosted in IIS. An unauthenticated attacker can send a malicious serialized object that causes remote code execution. Only systems using the Windows App or IE XBAP Web Client are vulnerable; regular installed clients and HTML5 Flex Clients are not affected. The vulnerability is particularly critical for systems accessible from the Internet. Siemens has released patches for v4.2 and v5.0; earlier versions (v3.x and below) will not receive patches and should be upgraded. For systems that cannot be patched immediately, disabling the Web Application/Web Client or blocking the CCOM port can reduce exposure.
- Network access to the CCOM port on your IIS server
- Windows App or IE XBAP Web Client must be enabled (regular installed clients and HTML5 Flex Clients are not affected)
- System is reachable from the attacker's network (Internet for directly exposed systems, or local network if behind firewall)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7faa5ce5-3e0e-432e-8b9b-c67d66e579b3