Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46590: CWE-611: Improper Restriction of XML External Entity Reference in Siemens Siemens OPC UA Modelling Editor (SiOME)

0
High
VulnerabilityCVE-2023-46590cvecve-2023-46590cwe-611
Published: Tue Nov 14 2023 (11/14/2023, 11:04:22 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: Siemens OPC UA Modelling Editor (SiOME)

Description

A vulnerability has been identified in Siemens OPC UA Modelling Editor (SiOME) (All versions < V2.8). Affected products suffer from a XML external entity (XXE) injection vulnerability. This vulnerability could allow an attacker to interfere with an application's processing of XML data and read arbitrary files in the system.

AI-Powered Analysis

AILast updated: 12/16/2025, 17:34:58 UTC

Technical Analysis

CVE-2023-46590 identifies an XML External Entity (XXE) injection vulnerability in Siemens OPC UA Modelling Editor (SiOME) versions earlier than 2.8. XXE vulnerabilities arise when XML parsers process external entity references without proper restrictions, allowing attackers to read local files or cause denial of service. In this case, the vulnerability permits remote, unauthenticated attackers to craft malicious XML payloads that the application processes, enabling arbitrary file disclosure on the host system. The vulnerability affects all versions of SiOME before 2.8, a tool used for modeling OPC UA (Open Platform Communications Unified Architecture) information models, which are critical in industrial automation and control systems. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on confidentiality but no impact on integrity or availability. The vulnerability is publicly disclosed but currently has no known exploits in the wild. The root cause is improper restriction of XML external entity references (CWE-611), a common issue in XML processing libraries when external entities are not disabled or sanitized. This flaw could allow attackers to read sensitive configuration files or credentials stored on the system, potentially leading to further compromise. Siemens has reserved the CVE and published the advisory but no patch links are provided yet, indicating that remediation may be pending or in progress.

Potential Impact

For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors relying on Siemens OPC UA Modelling Editor, this vulnerability poses a significant confidentiality risk. Unauthorized disclosure of sensitive files could expose system configurations, credentials, or intellectual property, facilitating subsequent attacks such as lateral movement or sabotage. Given the industrial context, compromised information could indirectly affect operational technology (OT) environments, increasing the risk of disruption or safety incidents. The vulnerability's network accessibility and lack of authentication requirements heighten the risk of remote exploitation by threat actors. Although no integrity or availability impact is directly reported, the confidentiality breach alone can have severe consequences in regulated sectors with strict data protection requirements, such as those governed by GDPR. Additionally, the potential for escalation or chaining with other vulnerabilities could amplify the threat. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score necessitates urgent attention.

Mitigation Recommendations

European organizations should immediately verify their use of Siemens OPC UA Modelling Editor and identify versions prior to 2.8. The primary mitigation is to upgrade to version 2.8 or later once available, as this will include fixes for the XXE vulnerability. Until patches are applied, organizations should implement strict XML input validation and disable external entity processing in XML parsers where possible. Network segmentation should be enforced to limit access to systems running SiOME, restricting exposure to trusted users and networks only. Monitoring and logging of XML processing errors and unusual file access patterns can help detect exploitation attempts. Employing intrusion detection systems (IDS) with signatures for XXE attacks may provide early warning. Additionally, reviewing and minimizing file permissions for the application can reduce the impact of any successful exploitation. Coordination with Siemens support for timely patch deployment and guidance is recommended. Finally, raising awareness among OT and IT security teams about this vulnerability will help ensure rapid response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2023-10-23T09:54:54.674Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6941947d9050fe8508061293

Added to database: 12/16/2025, 5:18:53 PM

Last enriched: 12/16/2025, 5:34:58 PM

Last updated: 12/20/2025, 2:25:35 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats