Siemens Desigo
Desigo CC deployments using Installed Client have an information disclosure vulnerability that allows unauthenticated access to sensitive server data via the event port (default 4998/tcp). An attacker on the network can read operational, configuration, or alarm information from the Desigo CC server without valid credentials. Siemens has not released a patch and recommends restricting access to the event port and disabling the Installed Client component in favor of Windows App Client or Flex Client. Siemens emphasizes layered network security and recommends isolating Desigo CC systems from business networks and the internet.
- Network access to port 4998/tcp on the Desigo CC server
- Desigo CC deployment using Installed Client (Windows App Client and Flex Client are not affected)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/912315a3-75a1-4455-bbc3-39734cd72076Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.