Description
A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 110 TL3 (All versions), blueplanet 125 NX3 M11 (All versions), blueplanet 125 TL3 (All versions), blueplanet 125 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 137 TL3 (All versions), blueplanet 150 TL3 (All versions), blueplanet 150 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 155 TL3 (All versions), blueplanet 155 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 165 TL3 (All versions), blueplanet 165 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 25.0 NX3-33.0 NX3 (All versions), blueplanet 3.0 NX3-20.0 NX3 (All versions), blueplanet 3.0 TL3-60.0 TL3 (All versions), blueplanet 3.0-5.0 NX1 (All versions), blueplanet 360 NX3 M6 (All versions), blueplanet 50.0 NX3-60.0 NX3 (All versions), blueplanet 87.0 TL3 (All versions), blueplanet 87.0 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 92.0 TL3 (All versions), blueplanet 92.0 TL3 GEN2 (All versions < V6.1.4.9), blueplanet gridsafe 110 TL3-S (All versions < V3.91), blueplanet gridsafe 137 TL3-S (All versions < V3.91), blueplanet gridsafe 92.0 TL3-S (All versions < V3.91), blueplanet hybrid 10.0 TL3 (All versions), blueplanet hybrid 6.0 NH3-12.0 NH3 (All versions). A CRC16-based algorithm for generating Technical Service credentials could allow an attacker to derive the credentials from the devices serial number and misuse them to gain unauthorized access.
Published: 2026-05-12
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A CRC16-based algorithm used to generate Technical Service credentials on Siemens Blueplanet devices allows an attacker who can obtain the device's serial number to compute the credentials and gain unauthorized access. The weakness is a key compromise during storage (CWE‑321). This flaw can lead to privileged use of the device services and potentially allow further exploitation of connected systems.

Affected Systems

The vulnerability affects a wide range of Siemens Blueplanet equipment, including the 100 NX3 M8, 100 TL3 GEN2 (versions < V6.1.4.9), 105 TL3, 105 TL3 GEN2 (versions < V6.1.4.9), 110 TL3, 125 NX3 M11, 125 TL3, 125 TL3 GEN2 (versions < V6.1.4.9), 137 TL3, 150 TL3, 150 TL3 GEN2 (versions < V6.1.4.9), 155 TL3, 155 TL3 GEN2 (versions < V6.1.4.9), 165 TL3, 165 TL3 GEN2 (versions < V6.1.4.9), 25.0 NX3‑33.0 NX3, 3.0 NX3‑20.0 NX3, 3.0 TL3‑60.0 TL3, 3.0‑5.0 NX1, 360 NX3 M6, 50.0 NX3‑60.0 NX3, 87.0 TL3, 87.0 TL3 GEN2 (versions < V6.1.4.9), 92.0 TL3, 92.0 TL3 GEN2 (versions < V6.1.4.9), gridsafe 110 TL3‑S (versions < V3.91), gridsafe 137 TL3‑S (versions < V3.91), gridsafe 92.0 TL3‑S (versions < V3.91), hybrid 10.0 TL3, and hybrid 6.0 NH3‑12.0 NH3. All versions of the listed models are affected, except where a version limit is specified.

Risk and Exploitability

With a CVSS score of 7.2, this flaw carries moderate to high impact; the EPSS score is not available and it is not yet listed in CISA KEV. The description indicates the vulnerability is a key compromise (CWE‑321). An attacker who can obtain the device’s serial number can compute the Technical Service credentials and authenticate as a privileged user. The text does not specify how the serial number could be obtained, so it is inferred from the description that the attack vector could be local or remote depending on device exposure. If the credentials are used, the attacker gains full technical‑service privileges, which can be used to reconfigure, interfere with, or eavesdrop on the system.

Generated by OpenCVE AI on May 12, 2026 at 10:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade all affected Blueplanet devices to the latest firmware that includes the fix or a version newer than those listed in the affected models.
  • Disable or restrict access to the Technical Service interface unless it is absolutely required, and enforce strong authentication for all device management interfaces.
  • Monitor device logs for unauthorized Technical Service logins and audit credential usage to detect potential abuse.

Generated by OpenCVE AI on May 12, 2026 at 10:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 11:15:00 +0000

Type Values Removed Values Added
Title Credential Compromise via CRC16 Derivation on Siemens Blueplanet Devices

Tue, 12 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 110 TL3 (All versions), blueplanet 125 NX3 M11 (All versions), blueplanet 125 TL3 (All versions), blueplanet 125 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 137 TL3 (All versions), blueplanet 150 TL3 (All versions), blueplanet 150 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 155 TL3 (All versions), blueplanet 155 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 165 TL3 (All versions), blueplanet 165 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 25.0 NX3-33.0 NX3 (All versions), blueplanet 3.0 NX3-20.0 NX3 (All versions), blueplanet 3.0 TL3-60.0 TL3 (All versions), blueplanet 3.0-5.0 NX1 (All versions), blueplanet 360 NX3 M6 (All versions), blueplanet 50.0 NX3-60.0 NX3 (All versions), blueplanet 87.0 TL3 (All versions), blueplanet 87.0 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 92.0 TL3 (All versions), blueplanet 92.0 TL3 GEN2 (All versions < V6.1.4.9), blueplanet gridsafe 110 TL3-S (All versions < V3.91), blueplanet gridsafe 137 TL3-S (All versions < V3.91), blueplanet gridsafe 92.0 TL3-S (All versions < V3.91), blueplanet hybrid 10.0 TL3 (All versions), blueplanet hybrid 6.0 NH3-12.0 NH3 (All versions). A CRC16-based algorithm for generating Technical Service credentials could allow an attacker to derive the credentials from the devices serial number and misuse them to gain unauthorized access.
Weaknesses CWE-321
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H'}

cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2026-05-12T12:43:12.162Z

Reserved: 2025-04-16T09:06:15.879Z

Link: CVE-2025-40946

cve-icon Vulnrichment

Updated: 2026-05-12T12:43:06.742Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T10:16:42.860

Modified: 2026-05-12T14:19:41.400

Link: CVE-2025-40946

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T11:00:07Z

Weaknesses