Siemens Security Slip: High-Risk Vulnerabilities in COMOS – Patch Now or Prepare for Chaos!

CISA has decided to retire from updating Siemens product vulnerabilities, passing the torch to Siemens’ ProductCERT Security Advisories. For now, Siemens COMOS users should brace themselves—vulnerabilities could allow attackers to execute arbitrary code or perform data infiltration. Remember, when in doubt, update to version 10.4.5.

Pro Dashboard

Hot Take:

Looks like Siemens just threw CISA under the bus and said, “Hey, keep up or get left behind!” Now you’ll have to visit Siemens’ website for the latest product vulnerability updates. It’s like CISA’s trying to give Siemens full custody of their vulnerabilities. Who knew cybersecurity could be this dramatic?

Key Points:

  • Siemens product vulnerabilities will no longer be updated by CISA after the initial advisory.
  • Vulnerabilities include incomplete input lists and cleartext transmission of sensitive information.
  • Exploitation could allow arbitrary code execution or data infiltration.
  • Affected Siemens products include COMOS versions prior to 10.4.5.
  • Mitigation measures include updating to the latest software version and securing network access.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?