Description
A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions), blueplanet 110 TL3 (All versions), blueplanet 125 NX3 M11 (All versions), blueplanet 125 TL3 (All versions), blueplanet 125 TL3 GEN2 (All versions), blueplanet 137 TL3 (All versions), blueplanet 150 TL3 (All versions), blueplanet 150 TL3 GEN2 (All versions), blueplanet 155 TL3 (All versions), blueplanet 155 TL3 GEN2 (All versions), blueplanet 165 TL3 (All versions), blueplanet 165 TL3 GEN2 (All versions), blueplanet 25.0 NX3-33.0 NX3 (All versions), blueplanet 3.0 NX3-20.0 NX3 (All versions), blueplanet 3.0-5.0 NX1 (All versions), blueplanet 360 NX3 M6 (All versions), blueplanet 50.0 NX3-60.0 NX3 (All versions), blueplanet 87.0 TL3 (All versions), blueplanet 87.0 TL3 GEN2 (All versions), blueplanet 92.0 TL3 (All versions), blueplanet 92.0 TL3 GEN2 (All versions), blueplanet gridsafe 110 TL3-S (All versions), blueplanet gridsafe 137 TL3-S (All versions), blueplanet gridsafe 92.0 TL3-S (All versions), blueplanet hybrid 10.0 TL3 (All versions), blueplanet hybrid 6.0 NH3-12.0 NH3 (All versions). Improper neutralization of special elements used in an sql command ('sql injection') in KACO Meteor server allows an authorized attacker to elevate privileges over a local network.
Published: 2026-05-12
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A SQL injection vulnerability has been discovered in the KACO Meteor component of Siemens BluePlanet systems. The flaw arises from improper neutralization of special elements in SQL commands, allowing an attacker with authorized local network access to execute arbitrary SQL statements. Exploitation can elevate the attacker’s privileges within the system, potentially granting full control over the device. The weakness is categorized as CWE‑89.

Affected Systems

The vulnerability affects every revision of the Siemens BluePlanet product family, including BluePlanet 100 NX3 M8, BluePlanet 100 TL3 GEN2, BluePlanet 105 TL3 and its GEN2 variants, BluePlanet 110 TL3, BluePlanet 125 NX3 M11, BluePlanet 125 TL3 and its GEN2 variants, BluePlanet 137 TL3, BluePlanet 150 TL3 and its GEN2 variants, BluePlanet 155 TL3 and its GEN2 variants, BluePlanet 165 TL3 and its GEN2 variants, BluePlanet 25.0 NX3 through 33.0 NX3, BluePlanet 3.0 NX3 to 20.0 NX3, BluePlanet 3.0‑5.0 NX1, BluePlanet 360 NX3 M6, BluePlanet 50.0 NX3‑60.0 NX3, BluePlanet 87.0 TL3 and its GEN2 variant, BluePlanet 92.0 TL3 and its GEN2 variant, BluePlanet gridsafe 110 TL3‑S, BluePlanet gridsafe 137 TL3‑S, BluePlanet gridsafe 92.0 TL3‑S, BluePlanet hybrid 10.0 TL3, and BluePlanet hybrid 6.0 NH3‑12.0 NH3. All listed models are affected regardless of firmware or software version.

Risk and Exploitability

The CVSS score of 5.9 indicates a moderate severity, reflecting the need for an authenticated attacker with local network presence. Because EPSS data is not available, the likelihood of exploitation cannot be precisely quantified, but the vulnerability is not currently listed in the CISA KEV catalog, which suggests no widespread public exploitation is documented. Nevertheless, the database-level elevation could lead to full control of the asset, compromising confidentiality, integrity, and availability within the local network. Based on the description, it is inferred that an attacker must have authorized local network access to exploit the flaw. Attackers would need to be authenticated or otherwise have legitimate credentials to interact with the KACO Meteor server; there is no mention of remote access.

Generated by OpenCVE AI on May 12, 2026 at 10:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Siemens patch (SSA‑545643) to all affected BluePlanet units
  • Restrict and audit user accounts on the KACO Meteor server, ensuring only necessary privileged users have access
  • Enable network segmentation to isolate the BluePlanet devices from critical infrastructure and monitor for anomalous database queries

Generated by OpenCVE AI on May 12, 2026 at 10:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 10:45:00 +0000

Type Values Removed Values Added
Title KACO Meteor SQL Injection Enables Local Privilege Escalation

Tue, 12 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions), blueplanet 110 TL3 (All versions), blueplanet 125 NX3 M11 (All versions), blueplanet 125 TL3 (All versions), blueplanet 125 TL3 GEN2 (All versions), blueplanet 137 TL3 (All versions), blueplanet 150 TL3 (All versions), blueplanet 150 TL3 GEN2 (All versions), blueplanet 155 TL3 (All versions), blueplanet 155 TL3 GEN2 (All versions), blueplanet 165 TL3 (All versions), blueplanet 165 TL3 GEN2 (All versions), blueplanet 25.0 NX3-33.0 NX3 (All versions), blueplanet 3.0 NX3-20.0 NX3 (All versions), blueplanet 3.0-5.0 NX1 (All versions), blueplanet 360 NX3 M6 (All versions), blueplanet 50.0 NX3-60.0 NX3 (All versions), blueplanet 87.0 TL3 (All versions), blueplanet 87.0 TL3 GEN2 (All versions), blueplanet 92.0 TL3 (All versions), blueplanet 92.0 TL3 GEN2 (All versions), blueplanet gridsafe 110 TL3-S (All versions), blueplanet gridsafe 137 TL3-S (All versions), blueplanet gridsafe 92.0 TL3-S (All versions), blueplanet hybrid 10.0 TL3 (All versions), blueplanet hybrid 6.0 NH3-12.0 NH3 (All versions). Improper neutralization of special elements used in an sql command ('sql injection') in KACO Meteor server allows an authorized attacker to elevate privileges over a local network.
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H'}

cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2026-05-12T12:42:01.940Z

Reserved: 2026-04-17T11:25:13.214Z

Link: CVE-2026-41125

cve-icon Vulnrichment

Updated: 2026-05-12T12:41:56.398Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T10:16:46.057

Modified: 2026-05-12T14:19:41.400

Link: CVE-2026-41125

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T10:30:13Z

Weaknesses