Siemens Mendix SAML Module
A vulnerability in the WIBU Systems CodeMeter Runtime component affects multiple Siemens building automation and power management products. The vulnerability could allow a user with high-level privileges to escalate their access on the affected system. Affected product families include Desigo CC (V5.0 through V8), SENTRON Powermanager (V5 through V8), SIMATIC PDM Maintenance Station (V5.0), and SIMATIC WinCC OA (V3.18, V3.19, V3.20). Siemens has released patches for recent versions (V8 and V3.18–V3.20) and recommends enabling encryption and restricting network access as immediate mitigations. Older versions (V5.0–V7) will not receive patches and must rely on network controls and encryption settings.
- Local or direct network access to the affected device
- High-privilege credentials (engineer or administrator account)
- Configuration without encryption enabled (UseEncryption disabled)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c9ea04ec-7614-4552-9d77-20ee667acf90Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.