Siemens SINEC NMS Third-Party
Multiple vulnerabilities in third-party components libexpat and libcurl used by SINEC NMS before version 1.0.3.1 allow remote attackers without authentication to compromise confidentiality, integrity, and availability. Affected CWEs include buffer overflow (CWE-121), use-after-free (CWE-416), double-free (CWE-415), improper input validation (CWE-440 and CWE-1286), and cleartext transmission (CWE-319). No public exploit code is currently known, but the vulnerabilities affect widely-used open-source libraries. Siemens recommends updating to SINEC NMS v1.0.3.1 or later and protecting network access with appropriate security controls.
- Network access to SINEC NMS service ports
- No authentication required
- Default or exposed NMS instance
Patching may require device reboot — plan for process interruption
/api/v1/advisories/055199b5-8af4-428d-953f-eec4d41c41bcGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.