Siemens OZW Web Servers
Siemens OZW672 and OZW772 Web Server versions contain two critical vulnerabilities (CVE-2025-26389 and CVE-2025-26390) in authentication and input validation mechanisms. CVE-2025-26389 allows unauthenticated remote code execution with root privileges on devices running firmware before V8.0. CVE-2025-26390 allows unauthenticated authentication bypass to Administrator privileges on devices running firmware before V6.0. Both vulnerabilities result from insufficient input validation (CWE-78: OS Command Injection; CWE-89: SQL Injection) in the web server request handling. Siemens has released firmware updates V8.0 and V6.0 addressing both issues and recommends immediate patching. General mitigations include network segmentation, firewall rules restricting access to authorized hosts only, and use of VPNs for any required remote access.
- Network access to the OZW web server port (typically HTTP/HTTPS)
- The device is running a vulnerable version (V8.0 or earlier for CVE-2025-26389; V6.0 or earlier for CVE-2025-26390)
- No authentication is required to trigger the vulnerability
Patching may require device reboot — plan for process interruption
/api/v1/advisories/00a7b0cb-931e-4c3e-96c0-14740e4d8393