Description
A vulnerability has been identified in Industrial Edge Management Pro V1 (All versions >= V1.7.6 < V1.15.17), Industrial Edge Management Pro V2 (All versions >= V2.0.0 < V2.1.1), Industrial Edge Management Virtual (All versions >= V2.2.0 < V2.8.0). Affected management systems do not properly enforce user authentication on remote connections to devices.
This could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user.
Successful exploitation requires that the attacker has identified the header and port used for remote connections to devices and that the remote connection feature is enabled for the device.

Exploitation allows the attacker to tunnel to the device. Security features on this device itself (e.g. app specific authentication) are not affected.
Published: 2026-04-14
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass via Remote Connections
Action: Apply Patch
AI Analysis

Impact

The vulnerability exists because the Industrial Edge Management systems do not enforce user authentication on remote connections to devices. An attacker who can identify the specific header and port used for these connections, and for which the remote connection feature is enabled, can bypass authentication and impersonate a legitimate user. This allows the attacker to establish a tunneled session to the target device, effectively gaining remote access without needing valid credentials. The security controls that exist on the device itself, such as application‑level authentication, remain unaffected by this bypass.

Affected Systems

Siemens Industrial Edge Management Pro V1, affected versions ranging from all releases starting at version 1.7.6 up to but not including 1.15.17; Siemen’s Industrial Edge Management Pro V2, affected versions from 2.0.0 up to but not including 2.1.1; and Siemens Industrial Edge Management Virtual, affected versions from 2.2.0 through 2.7.9. These products are used to manage industrial edge devices and require careful protection of remote access channels.

Risk and Exploitability

The CVSS score of 5.1 indicates a medium severity. Exploitation requires knowledge of the device’s remote connection header, port, and an enabled remote connection feature, but does not require any local privileges or elevated rights on the management system. EPSS data is unavailable, and the vulnerability is not listed in CISA’s KEV catalog, suggesting a lower frequency of known exploits. The likely attack vector is a remote network connection from an adversary who can reach the device’s designated port. Attackers could potentially tunnel into the device, potentially allowing further lateral movement or unauthorized configuration changes.

Generated by OpenCVE AI on April 14, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Siemens patch that enforces authentication on all remote connection endpoints.
  • If remote connections are not required, disable the remote connection feature on the affected devices.
  • Verify that only authorized users have valid credentials for remote access and enforce strong authentication policies.
  • Monitor system logs for suspicious connection attempts and block offending IPs or endpoints.
  • Frequently check Siemens’ advisory portal for updates and additional guidance.

Generated by OpenCVE AI on April 14, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Authentication Bypass via Remote Connections in Siemens Industrial Edge Management

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Siemens
Siemens industrial Edge Management Pro
Siemens industrial Edge Management Virtual
Vendors & Products Siemens
Siemens industrial Edge Management Pro
Siemens industrial Edge Management Virtual

Tue, 14 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in Industrial Edge Management Pro V1 (All versions >= V1.7.6 < V1.15.17), Industrial Edge Management Pro V2 (All versions >= V2.0.0 < V2.1.1), Industrial Edge Management Virtual (All versions >= V2.2.0 < V2.8.0). Affected management systems do not properly enforce user authentication on remote connections to devices. This could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user. Successful exploitation requires that the attacker has identified the header and port used for remote connections to devices and that the remote connection feature is enabled for the device. Exploitation allows the attacker to tunnel to the device. Security features on this device itself (e.g. app specific authentication) are not affected.
Weaknesses CWE-305
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Siemens Industrial Edge Management Pro Industrial Edge Management Virtual
cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2026-04-14T13:46:34.636Z

Reserved: 2026-03-24T15:32:19.390Z

Link: CVE-2026-33892

cve-icon Vulnrichment

Updated: 2026-04-14T13:46:31.635Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-14T09:16:36.097

Modified: 2026-04-17T15:24:57.753

Link: CVE-2026-33892

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:30:37Z

Weaknesses