OTPulse

Unencrypted Storage of User Credentials in QMS Automotive

Plan Patch7.6SSA-587547Nov 8, 2022
Attack VectorAdjacent
Auth RequiredLow
ComplexityLow
User InteractionNone needed
Summary

QMS Automotive stores user credentials in plaintext within the user database. An attacker with access to the database could read credentials and use them to impersonate authorized users. Siemens has released version 12.39 with a fix for this issue.

What this means
What could happen
An attacker with access to the QMS Automotive database could read plaintext user credentials, allowing them to impersonate authorized users and access production scheduling or configuration data without detection.
Who's at risk
Automotive manufacturing facilities and suppliers using QMS Automotive for production scheduling, order management, and quality control. Anyone managing production schedules, quality data, or manufacturing orders through QMS Automotive should prioritize this update.
How it could be exploited
An attacker needs access to the QMS Automotive user database (via compromised workstation, database access, or backup files). Once they retrieve the database, they can read plaintext credentials directly and use them to log in as legitimate users to the QMS system.
Prerequisites
  • Database-level access to QMS Automotive (via compromised workstation, SQL access, or file system access to database files
  • User credentials stored and readable in plaintext in the database
credentials stored in plaintexthigh impact on confidentiality and integritylow attack complexityrequires database access or compromised workstation
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
QMS Automotive< V12.3912.39
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate QMS Automotive to version 12.39 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/14ba438e-6a50-44e8-8887-63b357f51d21