First published: Tue May 13 2025(Updated: )
A vulnerability has been identified in OZW672 (All versions < V8.0), OZW772 (All versions < V8.0). The web service in affected devices does not sanitize the input parameters required for the `exportDiagramPage` endpoint. This could allow an unauthenticated remote attacker to execute arbitrary code with root privileges.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens OZW672 | <8.0 | |
OZW OZW772 | <8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26389 is considered a high severity vulnerability due to its potential for remote code execution by unauthenticated attackers.
CVE-2025-26389 affects OZW672 and OZW772 versions prior to 8.0.
To fix CVE-2025-26389, upgrade the affected OZW672 and OZW772 devices to version 8.0 or higher.
CVE-2025-26389 is a code injection vulnerability due to improper input sanitization.
Yes, CVE-2025-26389 can be exploited remotely by an unauthenticated attacker.