Missing Server Certificate Validation in Siemens Advanced Licensing (SALT) Toolkit
Multiple Siemens products contain improper certificate validation in the Siemens Advanced Licensing (SALT) Toolkit. The vulnerability is caused by missing server certificate validation (CWE-295), which could allow an unauthenticated remote attacker on the network to perform man-in-the-middle attacks against license server communications. An attacker positioned between a client and the SALT licensing server could present a forged certificate and intercept, modify, or deny license tokens, disrupting access to engineering and simulation software. Affected products include COMOS, JT Bi-Directional Translator, NX, Simcenter 3D, Simcenter Femap, Simcenter Studio, Simcenter System Architect, and Tecnomatix Plant Simulation.
- Network access to the data path between the affected product and the SALT licensing server
- Ability to intercept network traffic (e.g., ARP spoofing, DNS spoofing, or network position between client and server)
- No authentication credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8a861c2c-fafc-4fe3-b1bd-43cbfcc219e7