Siemens COMOS Web (Update A)
Multiple vulnerabilities in COMOS web components allow code injection (CWE-434), cross-site scripting (CWE-80), SQL injection (CWE-89), unrestricted file uploads (CWE-23), and cross-site request forgery (CWE-352). An attacker with valid engineering credentials can exploit these to inject malicious code, upload arbitrary files, execute database queries, and execute unauthorized commands. Affected versions: COMOS v10.2 (all versions with web enabled), v10.3 (prior to 10.3.3.3), and v10.4 (prior to 10.4.1).
- Valid COMOS engineering workstation account or credentials
- Network access to the COMOS web interface (typically port 80/443)
- Web components must be enabled in the COMOS installation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/15777bc9-d218-4f1d-8b48-c20d922c27f4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.