Siemens Industrial Products
An OpenSSH vulnerability (regreSSHion) affects multiple Siemens industrial products through a race condition that allows unauthenticated remote code execution with root privileges. The vulnerability exists in Industrial Edge Management OS (all versions), SINAMICS IIoT module (versions before 1.0 HF1), SINEMA Remote Connect Server (versions before 3.2 SP2), and SINUMERIK ONE (versions before 6.24). The vulnerability can be triggered on any SINUMERIK interface (X120, X127, X130) if the SSH port is open. Siemens has released fixes for some products but notes that Industrial Edge Management OS has no fix planned. Siemens recommends disabling SSH when possible, restricting SSH access to trusted systems only, and changing the default SSH port from 22/tcp to a nonstandard port.
- Network access to SSH port on the affected device (default 22/tcp)
- SSH service must be enabled on the device
- High attack complexity—attacker must exploit a specific race condition timing window
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f546e382-3290-4406-9d6c-cb6ec8932b52