CVE-2025-40801

HIGH

COMOS V10.6 - Info Disclosure

Title source: llm
STIX 2.1

Description

A vulnerability has been identified in COMOS V10.6 (All versions < V10.6.1), COMOS V10.6 (All versions < V10.6.1), JT Bi-Directional Translator for STEP (All versions), NX V2412 (All versions < V2412.8900 with Cloud Entitlement (bundled as NX X)), NX V2506 (All versions < V2506.6000 with Cloud Entitlement (bundled as NX X)), Simcenter 3D (All versions < V2506.6000 with Cloud Entitlement (bundled as Simcenter X Mechanical)), Simcenter Femap (All versions < V2506.0002 with Cloud Entitlement (bundled as Simcenter X Mechanical)), Simcenter Studio (All versions < V2506.0001), Simcenter System Architect (All versions < V2506.0001), Tecnomatix Plant Simulation (All versions < V2504.0007). The SALT SDK is missing server certificate validation while establishing TLS connections to the authorization server. This could allow an attacker to perform a man-in-the-middle attack.

Scores

CVSS v3 8.1
EPSS 0.0004
EPSS Percentile 11.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-295
Status published
Products (9)
Siemens/COMOS V10.6 < V10.6.1
Siemens/JT Bi-Directional Translator for STEP
Siemens/NX V2412 < V2412.8900
Siemens/NX V2506 < V2506.6000
Siemens/Simcenter 3D < V2506.6000
Siemens/Simcenter Femap < V2506.0002
Siemens/Simcenter Studio < V2506.0001
Siemens/Simcenter System Architect < V2506.0001
Siemens/Tecnomatix Plant Simulation < V2504.0007
Published Dec 09, 2025
Tracked Since Feb 18, 2026