Siemens OPC UA Modeling Editor (SiOME)
Siemens OPC UA Modeling Editor (SiOME) versions before 2.8 contain an XML external entity (XXE) injection vulnerability that allows an attacker to read arbitrary files on the affected workstation. The vulnerability occurs because the application processes XML data without properly validating or disabling external entity references. An attacker who can provide a malicious XML file to SiOME can exploit this to read sensitive files accessible to the workstation user, including configuration files, project data, or other sensitive information stored on that machine.
- Network access to the workstation running SiOME
- Ability to send or place a malicious XML file where SiOME will process it
- SiOME version before 2.8
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f6ff5992-a986-4325-ab62-cbc4e8e21e28Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.