Impact
The vulnerability exists because the Industrial Edge Management systems do not enforce user authentication on remote connections to devices. An attacker who can identify the specific header and port used for these connections, and for which the remote connection feature is enabled, can bypass authentication and impersonate a legitimate user. This allows the attacker to establish a tunneled session to the target device, effectively gaining remote access without needing valid credentials. The security controls that exist on the device itself, such as application‑level authentication, remain unaffected by this bypass.
Affected Systems
Siemens Industrial Edge Management Pro V1, affected versions ranging from all releases starting at version 1.7.6 up to but not including 1.15.17; Siemen’s Industrial Edge Management Pro V2, affected versions from 2.0.0 up to but not including 2.1.1; and Siemens Industrial Edge Management Virtual, affected versions from 2.2.0 through 2.7.9. These products are used to manage industrial edge devices and require careful protection of remote access channels.
Risk and Exploitability
The CVSS score of 5.1 indicates a medium severity. Exploitation requires knowledge of the device’s remote connection header, port, and an enabled remote connection feature, but does not require any local privileges or elevated rights on the management system. EPSS data is unavailable, and the vulnerability is not listed in CISA’s KEV catalog, suggesting a lower frequency of known exploits. The likely attack vector is a remote network connection from an adversary who can reach the device’s designated port. Attackers could potentially tunnel into the device, potentially allowing further lateral movement or unauthorized configuration changes.
OpenCVE Enrichment