Siemens Updates COMOS Holes

Friday, June 21, 2013 @ 04:06 PM gHale

Siemens now has software updates to mitigate the permissions, privileges, and access controls vulnerabilities that affect the COMOS database system, according to a report on ICS-CERT.

The following Siemens COMOS Versions 9.2 and 10.0 suffer from the issues:
COMOS 9.2: all versions < v092_Upd06_Patch010 ( and COMOS 10.0: all versions < V100_SP03_Patch004 (

Rush to Fix Medical Device Bug
IOServer Fixes Improper Input Validation
Schneider Mitigates PLCs Holes
Schneider Patches Quantum Holes

Successfully exploiting the vulnerability may result in an authenticated user gaining elevated privileges, potentially getting the ability to modify all COMOS objects available in the database.

Munich, Germany-based. Siemens develops products mainly in the energy, transportation, and healthcare sectors.

COMOS is an object-oriented database system that supports collecting, processing, saving, and distributing information. COMOS sees use across different engineering domains including functional engineering of plans and machines, engineering and design, automation and process control planning, and asset and plant management as examples. COMOS also allows the configuration of user privileges, much like any database system.

COMOS authenticated users with read privileges can use the client library to elevate their privileges for the Siemens COMOS database system. This could allow the attacker to access and modify all COMOS objects available in the database.

CVE-2013-3927 is the number assigned to this vulnerability, which has a CVSS v2 base score of 4.6.

This vulnerability is not exploitable remotely and cannot suffer exploitation without user interaction. The attacker must have local access to the system as an authenticated Windows user.

No known public exploits specifically target this vulnerability and an attacker with a low skill would be able to exploit this vulnerability.

Siemens has produced software updates, for Version 9.2 and for Version 10.0, that resolve this vulnerability.

Siemens recommends asset owners and operators contact Siemens customer support to acquire the software updates.

Click here for Siemens update information.

Click here for Siemens security advisory.

Leave a Reply

You must be logged in to post a comment.