CVE-2025-40800

Dec. 9, 2025, 6:36 p.m.

9.1
Critical

Description

A vulnerability has been identified in COMOS V10.6 (All versions), COMOS V10.6 (All versions), NX V2412 (All versions < V2412.8700), NX V2506 (All versions < V2506.6000), Simcenter 3D (All versions < V2506.6000), Simcenter Femap (All versions < V2506.0002), Solid Edge SE2025 (All versions < V225.0 Update 10), Solid Edge SE2026 (All versions < V226.0 Update 1). The IAM client in affected products is missing server certificate validation while establishing TLS connections to the authorization server. This could allow an attacker to perform a man-in-the-middle attack.

Product(s) Impacted

Vendor Product Versions
Siemens
  • Comos
  • Nx
  • Simcenter 3d
  • Simcenter Femap
  • Solid Edge Se2025
  • Solid Edge Se2026
  • 10.6
  • 2412, 2506
  • <2506.6000
  • <2506.0002
  • <225.0_update_10
  • <226.0_update_1

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-295
Improper Certificate Validation
The product does not validate, or incorrectly validates, a certificate.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a siemens comos 10.6 / / / / / / /
a siemens nx 2412 <2412.8700 / / / / /
a siemens nx 2506 <2506.6000 / / / / /
a siemens simcenter_3d <2506.6000 / / / / /
a siemens simcenter_femap <2506.0002 / / / / / /
a siemens solid_edge_se2025 <225.0_update_10 / / / / / /
a siemens solid_edge_se2026 <226.0_update_1 / / / / / /

CVSS Score

9.1 / 10

CVSS Data - 4.0

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Attack Requirements: PRESENT
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope:
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • Exploit Maturity: NOT_DEFINED
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    View Vector String

Timeline

Published: Dec. 9, 2025, 4:17 p.m.
Last Modified: Dec. 9, 2025, 6:36 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

productcert@siemens.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.