Siemens INTRALOG WMS
INTRALOG WMS before V5 is affected by multiple vulnerabilities in the Microsoft .NET implementation, including improper input validation (CWE-20), uncontrolled resource consumption (CWE-400), use-after-free memory errors (CWE-416), path traversal (CWE-59), cleartext transmission (CWE-319), and insufficient validation of array indexes (CWE-407). An attacker with network access could exploit these to execute arbitrary code or cause denial of service. Siemens has released version V5 with fixes and recommends immediate update to this version or later.
- Network access to INTRALOG WMS service
- INTRALOG WMS version before V5 deployed and accessible from attacker's network
- No authentication required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c8d41385-b9ec-48bd-8ce9-e603829dadb0Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.