Siemens Desigo CC and Cerberus DMS
Desigo CC and Cerberus DMS rely on SIMATIC WinCC OA, which implements only client-side authentication for parts of their client-server communication. This allows unauthenticated attackers to impersonate users or bypass authentication checks in the protocol. An attacker with network access could perform unauthorized actions on the building automation system without valid credentials. Siemens has not released patches for any affected version of Cerberus DMS, Desigo CC, or Desigo CC Compact and recommends network isolation and mitigation controls instead.
- Network access to Desigo CC or Cerberus DMS client-server communication ports
- No valid user credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ac6a826b-f553-4804-9398-409c9558c733Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.