Siemens Industrial Products
An OpenSSH race condition vulnerability (regreSSHion) in multiple Siemens industrial products allows an unauthenticated remote attacker to bypass authentication and execute commands with root privileges. Affected products include SINAMICS IIoT module, SINEMA Remote Connect Server, SINUMERIK ONE CNC control systems, and Industrial Edge Management OS. The vulnerability can be triggered on SINUMERIK interfaces if the SSH port is exposed. High CVSS score of 8.1 reflects the ability to achieve code execution with full system compromise. Industrial Edge Management OS has no patch planned by Siemens.
- Network access to SSH port 22/tcp (or custom SSH port if changed)
- SSH service must be enabled and reachable from the attacker's network location
- Device must be running a vulnerable version of OpenSSH
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f546e382-3290-4406-9d6c-cb6ec8932b52Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.