OTPulse

Multiple Vulnerabilities in COMOS before V10.4.5

Plan Patch9.3SSA-682326Nov 11, 2025
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

COMOS contains two vulnerabilities (CWE-184: Incomplete List of Disallowed Inputs, CWE-319: Cleartext Transmission of Sensitive Information) that could enable arbitrary code execution or data infiltration. An attacker with local access to a COMOS workstation or server could exploit these flaws to run arbitrary commands, modify engineering data, or exfiltrate sensitive process configurations.

What this means
What could happen
An attacker with local access to a COMOS workstation could run arbitrary code with system privileges, potentially modifying engineering configurations, stealing sensitive process data, or disrupting plant operations through unauthorized changes to control logic.
Who's at risk
Engineering and plant operations teams at utilities and industrial facilities that use Siemens COMOS for process engineering, control system design, and plant configuration. This includes water authorities, electric utilities, chemical plants, and manufacturing facilities that rely on COMOS for automation system engineering and lifecycle management.
How it could be exploited
An attacker with local access to a COMOS engineering workstation exploits insufficient input validation (CWE-184) or insecure data transmission (CWE-319) to inject and execute arbitrary commands on the system. This could allow modification of process control configurations or exfiltration of sensitive plant data.
Prerequisites
  • Local access to a COMOS engineering workstation or server
  • COMOS version prior to 10.4.5
Local access requiredHigh complexity exploitLow EPSS scoreEngineering workstations and servers at riskConfiguration and data theft possible
Exploitability
Low exploit probability (EPSS 0.9%)
Affected products (1)
ProductAffected VersionsFix Status
COMOS< 10.4.510.4.5
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate COMOS to version 10.4.5 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/ddb6c14d-dfb6-44f9-bcb4-7f979f561ac3
Multiple Vulnerabilities in COMOS before V10.4.5 | CVSS 9.3 - OTPulse