Siemens Building X - Security Manager Edge Controller
Building X - Security Manager Edge Controller (ACC-AP) and SiPass integrated controller (ACC-G2) devices fail to verify the integrity of firmware updates. An attacker with local access or the ability to upload a firmware file could install malicious firmware that bypasses the device's normal integrity checks. The vulnerability exists because the devices accept and execute firmware without cryptographic verification. Siemens states no fix is planned for these products and recommends using the ACC Firmware App with manual hash verification for updates, implementing strict access controls, and isolating the devices on a protected network.
- Local physical access to the device or ability to access the firmware upload interface
- ACC Firmware App access or direct write access to the device
- No authentication verification of firmware integrity is currently enforced by the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e38cb057-dac9-4dd4-863f-380d9596fa1fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.