Skip to main content

CVE-2025-26390: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Siemens OZW672

Critical
VulnerabilityCVE-2025-26390cvecve-2025-26390cwe-89
Published: Tue May 13 2025 (05/13/2025, 09:38:35 UTC)
Source: CVE
Vendor/Project: Siemens
Product: OZW672

Description

A vulnerability has been identified in OZW672 (All versions < V6.0), OZW772 (All versions < V6.0). The web service of affected devices is vulnerable to SQL injection when checking authentication data. This could allow an unauthenticated remote attacker to bypass the check and authenticate as Administrator user.

AI-Powered Analysis

AILast updated: 07/06/2025, 18:39:32 UTC

Technical Analysis

CVE-2025-26390 is a critical SQL injection vulnerability affecting Siemens OZW672 and OZW772 devices running versions prior to 6.0. The vulnerability resides in the web service component responsible for authentication data verification. Specifically, the web service fails to properly neutralize special elements in SQL commands, allowing an unauthenticated remote attacker to inject malicious SQL code. This flaw enables the attacker to bypass authentication checks and gain administrator-level access without valid credentials. Given the nature of the vulnerability (CWE-89), the attacker can manipulate SQL queries executed by the backend database, potentially leading to unauthorized data access, modification, or deletion, as well as full control over the device's management interface. The CVSS v3.1 score of 9.8 reflects the high severity, with network attack vector, no required privileges or user interaction, and a full impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a prime target for exploitation once publicized. Siemens OZW672 and OZW772 devices are typically used in industrial or infrastructure environments, where unauthorized administrative access could have severe operational consequences.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those operating critical infrastructure, manufacturing plants, or industrial control systems that utilize Siemens OZW672 or OZW772 devices. Successful exploitation could lead to unauthorized administrative access, allowing attackers to alter device configurations, disrupt operations, or pivot to other network segments. The compromise of such devices could result in operational downtime, safety hazards, data breaches, and potential regulatory non-compliance under frameworks like GDPR or NIS Directive. The criticality is heightened in sectors such as energy, transportation, and manufacturing, where Siemens devices are prevalent. Additionally, the ability to bypass authentication remotely without user interaction increases the risk of automated or large-scale attacks targeting European industrial environments.

Mitigation Recommendations

Organizations should prioritize upgrading affected Siemens OZW672 and OZW772 devices to version 6.0 or later, where this vulnerability is addressed. In the absence of an immediate patch, network segmentation should be enforced to isolate these devices from untrusted networks, limiting exposure to potential attackers. Implement strict access control lists (ACLs) and firewall rules to restrict inbound traffic to the device's management interfaces. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection capabilities tuned to identify SQL injection attempts targeting these devices. Regularly audit device logs for suspicious authentication attempts or anomalies. Additionally, consider deploying web application firewalls (WAFs) capable of detecting and blocking SQL injection payloads. Finally, maintain an inventory of all Siemens OZW devices to ensure comprehensive coverage and timely remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2025-02-07T15:33:59.767Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aeccb8

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 7/6/2025, 6:39:32 PM

Last updated: 8/18/2025, 11:32:18 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats