Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46590: CWE-611: Improper Restriction of XML External Entity Reference in Siemens Siemens OPC UA Modelling Editor (SiOME)

0
High
VulnerabilityCVE-2023-46590cvecve-2023-46590cwe-611
Published: Tue Nov 14 2023 (11/14/2023, 11:04:22 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: Siemens OPC UA Modelling Editor (SiOME)

Description

CVE-2023-46590 is a high-severity XML External Entity (XXE) injection vulnerability affecting Siemens OPC UA Modelling Editor (SiOME) versions prior to 2. 8. This flaw allows unauthenticated remote attackers to exploit improper XML parsing to read arbitrary files on the affected system, potentially exposing sensitive information. The vulnerability does not impact integrity or availability but poses a significant confidentiality risk. Exploitation requires no user interaction and can be performed remotely over the network. No known public exploits exist yet, but the vulnerability is rated with a CVSS score of 7. 5, indicating a serious threat. European organizations using Siemens industrial automation tools, especially in critical infrastructure sectors, are at risk. Mitigation involves upgrading to version 2. 8 or later once available, or applying strict XML input validation and disabling external entity processing in XML parsers.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:33:00 UTC

Technical Analysis

CVE-2023-46590 is an XML External Entity (XXE) injection vulnerability classified under CWE-611, found in Siemens OPC UA Modelling Editor (SiOME) versions earlier than 2.8. The vulnerability arises from improper restriction of XML external entity references during XML data processing. An attacker can craft malicious XML input containing external entity definitions that, when processed by the vulnerable application, allow reading of arbitrary files on the host system. This can lead to unauthorized disclosure of sensitive configuration files, credentials, or other critical data stored on the system. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS v3.1 score of 7.5 reflects high confidentiality impact, no impact on integrity or availability, low attack complexity, and no privileges required. Siemens OPC UA Modelling Editor is used in industrial automation environments to model OPC UA information models, making this vulnerability particularly relevant for operational technology (OT) environments. Although no known exploits are currently in the wild, the potential for information disclosure in critical infrastructure environments necessitates urgent attention. The lack of a patch link suggests that a fixed version (2.8 or later) is either pending release or recently released but not linked here. Organizations should monitor Siemens advisories closely.

Potential Impact

For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors relying on Siemens industrial automation products, this vulnerability poses a significant risk of confidential data exposure. Unauthorized file reads could reveal sensitive operational data, system configurations, or credentials, potentially facilitating further attacks or espionage. Given the widespread use of Siemens products in Europe, particularly in Germany, France, Italy, and the UK, the impact could be substantial. Disclosure of sensitive data could disrupt industrial processes, lead to intellectual property theft, or compromise safety systems indirectly. Although the vulnerability does not allow direct system control or denial of service, the confidentiality breach alone can have severe operational and reputational consequences. The remote, unauthenticated nature of the exploit increases the likelihood of targeted attacks against European OT environments.

Mitigation Recommendations

1. Upgrade Siemens OPC UA Modelling Editor to version 2.8 or later as soon as it becomes available to ensure the vulnerability is patched. 2. Until patching is possible, disable XML external entity processing in the XML parser configurations used by SiOME, if configurable. 3. Implement strict input validation and sanitization for all XML inputs to prevent malicious entity definitions. 4. Restrict network access to the OPC UA Modelling Editor interface to trusted internal networks only, using firewalls and network segmentation. 5. Monitor logs and network traffic for unusual XML payloads or access patterns indicative of XXE exploitation attempts. 6. Conduct security awareness training for OT personnel to recognize and report suspicious activity. 7. Coordinate with Siemens support for any interim mitigation guidance or hotfixes. 8. Incorporate this vulnerability into vulnerability management and incident response plans to ensure rapid detection and remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2023-10-23T09:54:54.674Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6941947d9050fe8508061293

Added to database: 12/16/2025, 5:18:53 PM

Last enriched: 12/23/2025, 6:33:00 PM

Last updated: 2/7/2026, 1:11:35 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats