Siemens Siveillance OIS
The Siveillance Open Interface Services (OIS) application, used to integrate building subsystems into Siemens management platforms, contains an OS command injection vulnerability (CWE-78) in how it processes integration requests. An unauthenticated attacker can send a crafted request to the OIS port (443/TCP) containing shell metacharacters that bypass input validation and execute arbitrary commands with root privileges on the host operating system. The vulnerability affects all versions of Desigo CC with OIS, GMA-Manager, Operation Scheduler, Siveillance Control, and Siveillance Control Pro running on Debian 9 or later.
- Network access to port 443/TCP on the Siveillance OIS server
- OIS application accessible from attacker's network location
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d5d39947-15c2-4ab3-85da-9a85b37c7118Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.