Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40801: CWE-295: Improper Certificate Validation in Siemens COMOS V10.6

0
High
VulnerabilityCVE-2025-40801cvecve-2025-40801cwe-295
Published: Tue Dec 09 2025 (12/09/2025, 10:44:24 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: COMOS V10.6

Description

A vulnerability has been identified in COMOS V10.6 (All versions < V10.6.1), COMOS V10.6 (All versions < V10.6.1), JT Bi-Directional Translator for STEP (All versions), NX V2412 (All versions < V2412.8900 with Cloud Entitlement (bundled as NX X)), NX V2506 (All versions < V2506.6000 with Cloud Entitlement (bundled as NX X)), Simcenter 3D (All versions < V2506.6000 with Cloud Entitlement (bundled as Simcenter X Mechanical)), Simcenter Femap (All versions < V2506.0002 with Cloud Entitlement (bundled as Simcenter X Mechanical)), Simcenter Studio (All versions < V2506.0001), Simcenter System Architect (All versions < V2506.0001), Tecnomatix Plant Simulation (All versions < V2504.0007). The SALT SDK is missing server certificate validation while establishing TLS connections to the authorization server. This could allow an attacker to perform a man-in-the-middle attack.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 19:00:48 UTC

Technical Analysis

CVE-2025-40801 is a vulnerability identified in Siemens COMOS V10.6 (all versions prior to 10.6.1) and several other Siemens products including JT Bi-Directional Translator for STEP, NX V2412 and V2506 with Cloud Entitlement, Simcenter 3D, Simcenter Femap, Simcenter Studio, Simcenter System Architect, and Tecnomatix Plant Simulation. The root cause is improper certificate validation (CWE-295) within the SALT SDK, which is used by these products to establish TLS connections to Siemens authorization servers. Specifically, the SALT SDK does not validate the server's TLS certificate, allowing an attacker positioned on the network path to intercept and manipulate communications via a man-in-the-middle attack. This can lead to exposure or modification of sensitive data, unauthorized commands, or disruption of service. The vulnerability has a CVSS v3.1 score of 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, no privileges or user interaction required, but high attack complexity. Although no exploits are currently known in the wild, the vulnerability affects critical industrial and engineering software widely used in manufacturing, engineering design, and simulation environments. The lack of certificate validation undermines the fundamental security guarantees of TLS, making this a serious threat to organizations relying on these Siemens products for secure communications with cloud services or authorization servers.

Potential Impact

The vulnerability poses a significant risk to organizations using affected Siemens products, particularly those in industrial, manufacturing, and engineering sectors. Successful exploitation could allow attackers to intercept sensitive data such as design files, intellectual property, or authorization tokens. Attackers could also manipulate communications to inject malicious commands or disrupt normal operations, potentially leading to operational downtime or compromised product integrity. Given the critical nature of these engineering and simulation tools, such disruptions could have cascading effects on production lines, supply chains, and product development cycles. The high CVSS score indicates severe impact on confidentiality, integrity, and availability. Since no authentication or user interaction is required, and the attack can be conducted remotely over the network, the threat surface is broad. Organizations with remote or cloud-connected deployments are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation, but the risk of future exploitation remains high.

Mitigation Recommendations

Organizations should immediately identify all instances of affected Siemens products, including COMOS V10.6 and related software with SALT SDK dependencies. The primary mitigation is to upgrade to the fixed versions: COMOS V10.6.1 or later, NX V2412.8900 or later, NX V2506.6000 or later, Simcenter 3D V2506.6000 or later, Simcenter Femap V2506.0002 or later, Simcenter Studio V2506.0001 or later, Simcenter System Architect V2506.0001 or later, and Tecnomatix Plant Simulation V2504.0007 or later. Until patches are applied, organizations should restrict network access to authorization servers to trusted networks only, implement network segmentation to isolate affected systems, and monitor network traffic for signs of man-in-the-middle activity such as unexpected TLS certificate anomalies or unusual traffic patterns. Employing network-level TLS interception detection tools and anomaly-based intrusion detection systems can help identify exploitation attempts. Additionally, organizations should review and harden their TLS configurations and consider deploying endpoint security solutions capable of detecting suspicious network behaviors. Coordination with Siemens support for guidance and updates is recommended. Finally, educating users about the risks of connecting to untrusted networks can reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2025-04-16T08:50:26.973Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6938009029016b16de45fea7

Added to database: 12/9/2025, 10:57:20 AM

Last enriched: 3/10/2026, 7:00:48 PM

Last updated: 3/25/2026, 2:09:01 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses