Siemens Opcenter Quality
Siemens Opcenter Quality versions 13.1 (before 13.1.20220624) and 13.2 (before 13.2.20220624) contain an authentication bypass vulnerability in the IbsGailWrapper-interface used by rich client modules. After a record is issued, the vulnerability allows unauthenticated access to application modules or denial of service for legitimate users. The issue affects installations configured with Encrypted=2 in ibs.config. Siemens has released patched versions and recommends immediate update or, if patching is delayed, replacement of IbsGailWrapper-DLLs and modification of security mode settings in consultation with Siemens support.
- Network access to the Opcenter Quality application (typically local network)
- Ability to issue a record to trigger the vulnerability condition
- Installation must use Encrypted=2 configuration in ibs.config
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9552f6a9-2367-455c-b183-295559ab63a7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.