Siemens COMOS
COMOS before version 10.6 contains an arbitrary code execution vulnerability in the integrated Open Design Alliance Drawings SDK. A local attacker could execute arbitrary code by crafting a malicious design file and inducing a user to import it into COMOS. Successful exploitation could allow an attacker to run commands with COMOS user privileges, potentially modifying process designs or compromising system data. This vulnerability requires local access and user interaction—it is not remotely exploitable.
- Local access to a COMOS workstation
- User interaction required—attacker must trick a user into importing or opening a malicious design file
- COMOS version earlier than 10.6 must be installed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d44ffed3-e7f3-48da-ad76-c4b9357e8415Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.