Siemens OZW Web Servers
OZW672 and OZW772 Web Servers contain command injection (CWE-78) and SQL injection (CWE-89) vulnerabilities. Versions before V8.0 allow unauthenticated remote arbitrary code execution with root privileges. Versions before V6.0 allow unauthenticated authentication bypass granting Administrator access. Siemens has released patched firmware versions 8.0 and 6.0 for both products. Network exposure should be minimized by restricting access to these devices behind firewalls and using VPN for any remote management access.
- Network access to OZW672 or OZW772 web server (HTTP/HTTPS ports)
- Device running vulnerable firmware version (V8.0 or earlier for code execution, V6.0 or earlier for authentication bypass)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/00a7b0cb-931e-4c3e-96c0-14740e4d8393Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.