Siemans QMS Automotive
QMS Automotive before V12.39 contains multiple vulnerabilities including malicious code injection, information disclosure, and denial of service. The vulnerabilities stem from improper credential handling (CWE-256, CWE-284), weak cryptography (CWE-319, CWE-316), insufficient input validation (CWE-434, CWE-550), and broken authentication (CWE-347, CWE-922). An attacker with valid credentials could exploit these flaws to modify production data, extract sensitive information, or disable the quality management system. Siemens has released update V12.39 which addresses all identified issues.
- Valid user account credentials for QMS Automotive
- Network access to the QMS Automotive application server (typically port 80/443 or proprietary ports)
- QMS Automotive version prior to 12.39
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c53db1f5-e825-4164-b0af-41b3deb5d0bfGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.