Siemens Desigo PXM Devices
Siemens Desigo PXM30, PXM40, PXM50, and PXG3 building automation controllers contain multiple vulnerabilities in the embedded webserver. These include command injection (CWE-78), sensitive information disclosure (CWE-200), cross-site scripting (CWE-79), cross-site request forgery (CWE-352), and improper neutralization flaws. An authenticated attacker with network access to the device's web interface could execute arbitrary commands on the controller, access sensitive configuration data, trigger denial of service conditions, or perform remote code execution. The vulnerabilities affect all versions prior to 02.20.126.11-41 (or 02.20.126.11-37 for certain models).
- Network access to the Desigo PXM device web server port (80 or 443)
- Valid login credentials for the device web interface
- Device running a vulnerable firmware version (below 02.20.126.11-41 for PXM, below 02.20.126.11-37 for PXG3.W100-1/W200-1)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f89d5445-0c44-4506-92c3-0e3e06cf4d54Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.