Skip to content
Threat Feed

Vendor

Siemens AG

5 briefs RSS
medium advisory

Siemens Teamcenter Hardcoded Key Vulnerability (CVE-2026-33893)

CVE-2026-33893 describes a vulnerability in Siemens Teamcenter where hardcoded keys used for obfuscation are stored directly within the application, potentially allowing an attacker to obtain these keys and gain unauthorized access.

Teamcenter V2312 +4 cve vulnerability hardcoded-key teamcenter
2r 2t 1c
critical advisory

ROS# Path Traversal Vulnerability (CVE-2026-41551)

ROS# versions prior to V2.2.2 are vulnerable to path traversal (CVE-2026-41551) due to insufficient sanitization of user input, potentially enabling remote attackers to read arbitrary files.

ROS# path-traversal vulnerability cve
2r 1t 1c
medium advisory

CVE-2026-25789 - Firmware Update Page Filename Sanitization Vulnerability

CVE-2026-25789 describes a vulnerability where affected devices do not properly validate and sanitize filenames on the Firmware Update page, potentially allowing a remote attacker to execute malicious JavaScript in the context of the user's session through social engineering, leading to session hijacking or credential theft.

xss filename-sanitization web-application
2r 2t 1c
medium advisory

CVE-2026-22925: Siemens SIMATIC CN 4100 Resource Exhaustion via TCP SYN Flood

Siemens SIMATIC CN 4100 versions before V5.0 are vulnerable to resource exhaustion due to processing a high volume of TCP SYN packets, leading to a denial-of-service condition.

SIMATIC CN 4100 dos resource-exhaustion cve-2026-22925
1r 1c
medium advisory

CVE-2025-40833 Null Pointer Dereference in Affected Devices Leads to Denial of Service

A null pointer dereference vulnerability exists in affected devices while processing specially crafted IPv4 requests, potentially allowing a remote attacker to cause a denial of service, requiring a manual restart to recover the system.

dos cve-2025-40833
2r 1t 1c