Advisory

Critical flaw reported in Siemens advanced licensing toolkit

Take action: If you use any Siemens products, make sure they are isolated from the internet and only accessible from trusted networks. Plan an update for the products if patches available (NX, Simcenter 3D, Simcenter Femap, or Tecnomatix). For products without fixes, network isolation is the only available mitigation.


Learn More

Siemens has is reporting a critical security vulnerability in its Advanced Licensing (SALT) Toolkit that affects multiple industrial software products. 

The flaw is tracked CVE-2025-40801 (CVSS score 9.2), is caused by improper certificate validation and could allow unauthenticated remote attackers to perform man-in-the-middle attacks. The SALT SDK fails to validate server certificates while establishing TLS connections to authorization servers, enabling attackers to intercept and manipulate sensitive communications. 

The vulnerability impacts a multiple Siemens industrial software products:

  • COMOS V10.6 (all versions)
  • JT Bi-Directional Translator for STEP (all versions)
  • NX V2412 (versions prior to 2412.8900)
  • NX V2506 (versions prior to 2506.6000)
  • Simcenter 3D (versions prior to 2506.6000)
  • Simcenter Femap (versions prior to 2506.0002)
  • Simcenter Studio (all versions)
  • Simcenter System Architect (all versions)
  • Tecnomatix Plant Simulation (versions prior to 2504.0007)

Siemens has released patches for several affected products, but some products currently have no available fixes or planned updates. 

  • NX V2412 users should update to version 2412.8900 or later,
  • NX V2506 and Simcenter 3D users should upgrade to version 2506.6000 or later.
  • Simcenter Femap users should update to version 2506.0002 or later,
  • Tecnomatix Plant Simulation users should update to version 2504.0007 or later. 

No fix is currently planned for JT Bi-Directional Translator for STEP, and no fixes are yet available for COMOS V10.6, Simcenter Studio, and Simcenter System Architect.

As immediate mitigation measures, Siemens recommends implementing network-level protections to minimize exposure. Organizations should ensure that control system devices are not accessible from the internet, isolate control system networks behind firewalls, and use secure remote access methods such as VPNs when necessary.

Critical flaw reported in Siemens advanced licensing toolkit