Siemens Automation License Manager
Siemens Automation License Manager V5 (all versions) and V6 (before SP9 Upd4) contain two combined vulnerabilities in file handling that allow an attacker to modify and rename license files, extract licenses, and overwrite arbitrary files on the host system. This could lead to privilege escalation and remote code execution. The vulnerability requires network access to port 4410/TCP but no authentication. The affected functionality is not remotely accessible by default in V6.0 SP2 and later, but remains exploitable if remote access is explicitly enabled.
- Network access to port 4410/TCP (default License Manager port)
- Automation License Manager V6 version below 6.0 SP9 Upd4, or any version of V5
- Remote file access functionality must be enabled (disabled by default in V6.0 SP2 and later)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4f62243a-b700-4094-bd91-966c997daba1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.