Description
Affected devices do not properly validate and sanitize filenames on the Firmware Update page. This could allow a remote attacker to social engineer the user into selecting the modified firmware file to be uploaded. This would result in malitcious JavaScript execution in the context of the authenticated user's session without requiring the file to be uploaded, potentially leading to session hijacking or credential theft.
Published: 2026-05-12
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw stems from a failure to validate and sanitize file names on the Firmware Update page of Siemens industrial controllers. A remote attacker can socially engineer an operator into selecting a crafted firmware file. When the user selects the modified firmware file to be uploaded, embedded JavaScript can be executed in the context of the authenticated session, enabling the attacker to hijack the session or steal credentials. This is a classic cross‑site scripting (CWE‑79) vulnerability that can compromise confidentiality and integrity of user sessions.

Affected Systems

All Siemens SIMATIC Drive Controller CPUs listed (e.g., 1504D TF, 1507D TF), the entire ET 200SP CPU family (1510SP, 1511SP, 1512SP, 1514SP, 1515SP, 1516SP, 1517SP, 1518SP, 1514SPT variants), the S7‑1500 CPU series (various models such as 1511‑1, 1512C‑1, 1513‑1, 1515‑2, 1516‑3, 1517‑3, 1518‑4 and related variants), every ET 200pro CPU (1513PRO, 1516PRO), many S7‑1500 software controller models (including Linux and V2/V3 releases), and all SIPLUS and other variant models referenced. No specific version ranges are specified, so every device of the listed families is considered vulnerable until a corrective update is applied.

Risk and Exploitability

The CVSS score of 7.2 reflects a high severity impact if exploited. The EPSS score is not available and the vulnerability is not in the CISA KEV catalog, indicating no widely known public exploits at this time. The likely attack vector is remote via the web interface; the attacker must persuade or trick an authenticated user to upload the malicious firmware. Therefore, the probability of successful exploitation is moderate due to required user interaction, but the consequence is severe because the attack runs with the victim’s session privileges.

Generated by OpenCVE AI on May 12, 2026 at 11:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the firmware update described in the Siemens advisory SSA‑688146 (see https://cert-portal.siemens.com/productcert/html/ssa-688146.html) to correct the filename sanitization flaw.
  • Restrict access to the Firmware Update page to trusted administrators only, using network segmentation or firewall rules to limit interface exposure.
  • If firmware updates are not operationally required, disable or remove the Firmware Update functionality to eliminate the vulnerable code path.
  • Implement and enforce strict upload permissions and consider adding confirmation prompts or CSRF protections to reduce the risk of social‑engineering based uploads.

Generated by OpenCVE AI on May 12, 2026 at 11:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 11:45:00 +0000

Type Values Removed Values Added
Title Cross‑Site Scripting via Unsanitized Firmware File Names in Siemens Controllers

Tue, 12 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description Affected devices do not properly validate and sanitize filenames on the Firmware Update page. This could allow a remote attacker to social engineer the user into selecting the modified firmware file to be uploaded. This would result in malitcious JavaScript execution in the context of the authenticated user's session without requiring the file to be uploaded, potentially leading to session hijacking or credential theft.
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2026-05-12T12:40:29.635Z

Reserved: 2026-02-05T19:53:27.492Z

Link: CVE-2026-25789

cve-icon Vulnrichment

Updated: 2026-05-12T12:40:08.966Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T10:16:45.037

Modified: 2026-05-12T14:19:41.400

Link: CVE-2026-25789

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T11:30:14Z

Weaknesses