Siemens SINEC NMS
SINEC NMS before version 3.0 SP1 contains multiple vulnerabilities related to improper input validation, authentication bypass, buffer overflows, and insecure certificate handling. These weaknesses could allow local attackers to execute commands, access sensitive data, or disrupt network management operations. The vulnerabilities span improper input handling (CWE-20, CWE-113), memory safety issues (CWE-787, CWE-125), authentication weaknesses (CWE-295, CWE-297), certificate validation failures (CWE-295), and resource management issues (CWE-400, CWE-770, CWE-772).
- Local access to SINEC NMS system
- Non-administrative user credentials or ability to interact with the running service
- SINEC NMS running version prior to 3.0 SP1
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6d8b35ec-fbac-4eec-a6cf-a0d6620bdc06Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.