Siemens Brownfield Connectivity Client
Siemens Brownfield Connectivity Client versions prior to 2.15 contain multiple vulnerabilities in the underlying OpenSSL library. The vulnerabilities include improper certificate validation (CWE-295), weak cryptographic practices (CWE-327), OS command injection (CWE-78), and improper resource handling (CWE-404). Successful exploitation could lead to denial of service or, depending on the vulnerability, potential remote code execution. These vulnerabilities are remotely exploitable with low attack complexity and require no authentication. No known public exploits exist as of the advisory date, but the high EPSS score (41.2%) indicates significant exploit probability.
- Network access to the Brownfield Connectivity Client on its listening port (typically HTTPS)
- Client must be running a version prior to 2.15
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b2437f7e-11f7-4630-9db1-09456259ac53Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.