{"id":103479,"date":"2025-02-24T12:22:50","date_gmt":"2025-02-24T04:22:50","guid":{"rendered":"https:\/\/version-2.com\/?p=103479"},"modified":"2025-02-14T12:28:47","modified_gmt":"2025-02-14T04:28:47","slug":"how-to-find-siemens-devices-on-your-network-2","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/02\/how-to-find-siemens-devices-on-your-network-2\/","title":{"rendered":"How to find Siemens devices on your network"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"103479\" class=\"elementor elementor-103479\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"prose dark:prose-light prose--blog prose--blog-wide\"><h2 id=\"multiple-vulnerabilities\">Multiple vulnerabilities (February\u00a0 2025)<\/h2><p dir=\"ltr\">Siemens disclosed multiple vulnerabilities in various product lines:<\/p><ul><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-111547.html\" target=\"_blank\" rel=\"noopener\">SSA-111547<\/a> &#8211; cleartext storage of sensitive information in SIPROTEC 5 (CVSS score<strong> 5.1<\/strong>)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-195895.html\" target=\"_blank\" rel=\"noopener\">SSA-195895<\/a> &#8211;\u00a0user enumeration vulnerability in the web server of SIMATIC Products\u00a0(CVSS score <strong>6.9<\/strong>)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-224824.html\" target=\"_blank\" rel=\"noopener\">SSA-224824<\/a> &#8211;\u00a0denial of service vulnerabilities in SIMATIC S7-1200 CPU Family before V4.7\u00a0(CVSS score <strong>8.7<\/strong>)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-246355.html\" target=\"_blank\" rel=\"noopener\">SSA-246355<\/a> &#8211;\u00a0multiple vulnerabilities in Tableau Server Component of Opcenter Intelligence\u00a0before V2501 (CVSS score <strong><span style=\"color: #f14342;\">10.0<\/span><\/strong>)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-342348.html\" target=\"_blank\" rel=\"noopener\">SSA-342348<\/a> &#8211;\u00a0insufficient session expiration vulnerability in Siemens SIMATIC PCS neo, TIA Administrator, and TIA Portal\u00a0(CVSS score <strong>8.7<\/strong>)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-687955.html\" target=\"_blank\" rel=\"noopener\">SSA-687955<\/a> &#8211;\u00a0accessible development shell via physical interface in SIPROTEC 5 (CVSS score <strong>7.0<\/strong>)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-698820.html\" target=\"_blank\" rel=\"noopener\">SSA-698820<\/a> &#8211;\u00a0multiple vulnerabilities in FortiGate NGFW before V7.4.4 on RUGGEDCOM APE1808 devices\u00a0(CVSS score <strong>9.0<\/strong>)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-767615.html\" target=\"_blank\" rel=\"noopener\">SSA-767615<\/a> &#8211;\u00a0information disclosure via SNMP\u00a0in SIPROTEC 5 devices (CVSS score <strong>8.7<\/strong>)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-769027.html\" target=\"_blank\" rel=\"noopener\">SSA-769027<\/a> &#8211; multiple vulnerabilities in SCALANCE W700 IEEE 802.11ax devices before V3.0.0 (CVSS score <strong>8.6)<\/strong><\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-770770.html\" target=\"_blank\" rel=\"noopener\">SSA-770770<\/a> &#8211; multiple vulnerabilities in FortiGate NGFW before V7.4.5 on RUGGEDCOM APE1808 devices (CVSS score <strong>7.5<\/strong>)<\/li><\/ul><h3 id=\"what-is-the-impact\">What is the impact?<\/h3><p>The disclosed vulnerabilities range in severity. For the most critical vulnerabilities, unauthenticated remote attackers could execute arbitrary code and completely take over a vulnerable system. Successful exploitation of other disclosed vulnerabilities could result in denial-of-service conditions,\u00a0disclosure of sensitive information, or access to the underlying filesystem.<\/p><h3 id=\"are-updates-or-workarounds-available\">Are updates or workarounds available?<\/h3><p>For the disclosed vulnerabilities, Siemens has released updates or patches. Siemens recommends that access is restricted to trusted sources.\u00a0Refer to Siemens&#8217; website for more information about their <a href=\"https:\/\/www.siemens.com\/cert\/operational-guidelines-industrial-security\" target=\"_blank\" rel=\"noopener\">operational guideline<\/a>\u00a0recommendation.<\/p><h3 id=\"how-to-find-potentially-vulnerable-systems\">How to find\u00a0potentially vulnerable systems<\/h3><p dir=\"ltr\">From the <a href=\"https:\/\/console.runzero.com\/inventory\" target=\"_blank\" rel=\"noopener\">Asset Inventory<\/a>, runZero users applied the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>hw:\"SCALANCE M8\" OR hw:\"SIMATIC\" OR hw:\"RUGGEDCOM\" OR hw:\"SCALANCE\"<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><hr \/><h2 id=\"ten-vulnerabilities-disclosed-in-siemens-products\">Ten\u00a0vulnerabilities disclosed in Siemens products\u00a0(December 2024)<\/h2><p>Siemens <a href=\"https:\/\/www.siemens.com\/global\/en\/products\/services\/cert.html#SiemensSecurityAdvisories\">disclosed<\/a>\u00a0ten vulnerabilities in a variety of Siemens products, including their RUGGEDCOM, SENTRON,\u00a0and other product lines. These vulnerabilities have CVSS scores that range from 5.1 (<strong><em>moderate<\/em><\/strong>) to 8.6 (<strong><em>high<\/em><\/strong>).<\/p><p>The disclosed vulnerabilities range in severity. For the most the critical vulnerabilities, unauthenticated remote attackers could perform unauthorized administrative actions if they are able to get a local user to click on a malicious link.\u00a0Successful exploitation of other disclosed vulnerabilities could result in denial-of-service conditions or disclosure of sensitive information.<\/p><p>Siemens has released updated patches for these vulnerabilities.\u00a0 Siemens also recommends that all systems be kept behind firewalls and have unnecessary services disabled.<\/p><h3 id=\"how-to-find-potentially-vulnerable-systems\">How to find potentially vulnerable systems<\/h3><p dir=\"ltr\">From the <a href=\"https:\/\/console.runzero.com\/inventory\" target=\"_blank\" rel=\"noopener\">Asset Inventory<\/a>, use the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>vendor:Siemens<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><h2>\u00a0<\/h2><h2 id=\"multiple-vulnerabilities\">Multiple vulnerabilities (November 2024)<\/h2><p dir=\"ltr\">Siemens disclosed multiple vulnerabilities in various product lines:<\/p><ul><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-354112.html\" target=\"_blank\" rel=\"noopener\">SSA-354112<\/a>\u00a0&#8211; multiple vulnerabilities in SCALANCE M-800\u00a0Family devices (CVSS score<strong> 8.6<\/strong>)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-654798.html\" target=\"_blank\" rel=\"noopener\">SSA-654798<\/a>\u00a0&#8211; unauthenticated remote access to the filesystem in\u00a0SIMATIC CP devices\u00a0(CVSS score <strong>8.7<\/strong>)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-454789.html\" target=\"_blank\" rel=\"noopener\">SSA-454789<\/a> &#8211; deserialization of untrusted data in TeleControl Server (CVSS score <strong><span style=\"color: #f14342;\">10.0<\/span><\/strong>)<\/li><\/ul><h3 id=\"what-is-the-impact\">What is the impact?<\/h3><p>The disclosed vulnerabilities range in severity. For the most critical vulnerabilities, unauthenticated remote attackers could execute arbitrary code and completely take over a vulnerable system. Successful exploitation of other disclosed vulnerabilities could result in denial-of-service conditions,\u00a0disclosure of sensitive information, or access to the underlying filesystem.<\/p><h3 id=\"are-updates-or-workarounds-available\">Are updates or workarounds available?<\/h3><p>For the disclosed vulnerabilities, Siemens has released updates or patches. Siemens recommends that access is restricted to trusted sources.\u00a0Refer to Siemens&#8217; website for more information about their <a href=\"https:\/\/www.siemens.com\/cert\/operational-guidelines-industrial-security\" target=\"_blank\" rel=\"noopener\">operational guideline<\/a>\u00a0recommendation.<\/p><h3 id=\"how-to-find-potentially-vulnerable-systems\">How to find\u00a0potentially vulnerable systems<\/h3><p dir=\"ltr\">From the <a href=\"https:\/\/console.runzero.com\/inventory\" target=\"_blank\" rel=\"noopener\">Asset Inventory<\/a>, runZero users applied the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>hw:\"SCALANCE M8\" OR hw:\"SCALANCE S615\" OR hw:\"SIMATIC CP\" OR (os:\"Windows\" AND tcp_port:26865)<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><hr \/><h2 id=\"35-vulnerabilities\">35\u00a0vulnerabilities (September 2024)<\/h2><p>Siemens\u00a0<a href=\"https:\/\/www.siemens.com\/global\/en\/products\/services\/cert.html#SecurityPublications\">disclosed<\/a>\u00a035 vulnerabilities in a variety of Siemens products, including their LOGO!, SIMATIC, SINEMA, and other product lines. These vulnerabilities have CVSS scores that range from 4.3 (moderate) to 10 (<strong><em>extremely critical<\/em><\/strong>).<\/p><p>The most critical vulnerabilities disclosed include:<\/p><ul><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-955858.html\">SSA-955858<\/a>\u00a0&#8211; multiple vulnerabilities in LOGO! 8 BM devices (CVSS score 9.8)<strong><em><em><br \/><\/em><\/em><\/strong><\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-832273.html\">SSA-832273<\/a>\u00a0&#8211; multiple vulnerabilities in RUGGEDOM devices (CVSS score 9.8)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-721642.html\">SSA-721642<\/a>\u00a0&#8211; multiple vulnerabilities in SCALANCE devices (CVSS score 9.1)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-673996.html\">SSA-673996<\/a>\u00a0&#8211; multiple vulnerabilities in SICAM and SITIPE devices (CVSS score 8.2)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-629254.html\">SSA-629254<\/a>\u00a0&#8211; remote code execution vulnerability in SIMATIC SCADA and PCS 7 systems (CVSS score 9.1)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-455250.html\">SSA-455250<\/a>\u00a0&#8211; multiple vulnerabilities in RUGGEDCOM devices (CVSS score 9.8)<\/li><li><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-039007.html\">SSA-039007<\/a>\u00a0&#8211; heap-based buffer overflow in the Siemens User Management Console component (CVSS score 9.8)<\/li><\/ul><p>The disclosed vulnerabilities range in severity. For the most critical vulnerabilities, unauthenticated remote attackers could execute arbitrary code and completely take over a vulnerable system. Successful exploitation of other disclosed vulnerabilities could result in denial-of-service conditions or disclosure of sensitive information.<\/p><p>For most of the disclosed vulnerabilities, Siemens has released updates or patches. However, some vulnerabilities mentioned above, including some critical vulnerabilities, do not have patches released and it is unclear when such updates would be available. Siemens recommends that all systems be kept behind firewalls and have unnecessary services disabled.<\/p><h3 id=\"how-to-find-potentially-vulnerable-systems\">How to find potentially vulnerable systems<\/h3><p dir=\"ltr\">From the <a href=\"https:\/\/console.runzero.com\/inventory\" target=\"_blank\" rel=\"noopener\">Asset Inventory<\/a>, use the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>vendor:Siemens<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><hr \/><h2 id=\"scalance-and-ruggedcom-products\">SCALANCE and RUGGEDCOM products (August 2024)<\/h2><p dir=\"ltr\">Siemens\u00a0<a href=\"https:\/\/www.cisa.gov\/news-events\/ics-advisories\/icsa-24-228-01\" target=\"_blank\" rel=\"noopener\">disclosed<\/a> multiple vulnerabilities for a variety of products and devices, including the <strong>SCALANCE<\/strong> and <strong>RUGGEDCOM<\/strong> product lines.<\/p><ul><li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-41976\" target=\"_blank\" rel=\"noopener\">CVE-2024-41976<\/a> is rated <em><strong>high<\/strong><\/em>, with a CVSS score of 7.2, and allows an attacker to issue invalid VPN configuration data causing an authenticated attacker to execute arbitrary code.<\/li><li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-41977\" target=\"_blank\" rel=\"noopener\">CVE-2024-41977<\/a> is rated <em><strong>high<\/strong><\/em>, with a CVSS score of 7.1, and allows an attacker to escalate their privileges due to devices not properly enforcing user session isolation.<\/li><li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-41978\" target=\"_blank\" rel=\"noopener\">CVE-2024-41978<\/a> is rated <em><strong>high<\/strong><\/em>, with a CVSS score of 6.5, and allows an authenticated attacker to forge 2FA tokens of other users due to devices storing sensitive 2FA information in log files on disk.<\/li><li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-44321\" target=\"_blank\" rel=\"noopener\">CVE-2024-44321<\/a> is rated <em><strong>medium<\/strong><\/em>, with a CVSS score of 2.7, and allows an attacker to issue large input data causing an unauthenticated denial-of-service.<\/li><\/ul><p>Successful exploitation of this vulnerability would allow an <strong>authenticated<\/strong> attacker to remotely execute code, escalate their privileges, or forge other users credentials. The first three do require attacks be authenticated initially to exploit these vulnerabilities.<\/p><p dir=\"ltr\">The last vulnerability is on the lower score, but would still require the device be restarted if the denial-of-service condition was triggered.<\/p><p>Siemens recommends upgrading all affected devices to firmware <a href=\"https:\/\/support.industry.siemens.com\/cs\/document\/109971718\/firmware-v08-01-00-for-scalance-m800-s615-?dti=0&amp;lc=en-WW\" target=\"_blank\" rel=\"noopener\">V8.1 or later<\/a>. Additionally, users should ensure these devices are isolated in their own networks to prevent unwanted network traffic to the device.<\/p><h3 id=\"how-to-find-potentially-vulnerable-systems\">How to find\u00a0potentially vulnerable systems<\/h3><p dir=\"ltr\">From the <a href=\"https:\/\/console.runzero.com\/inventory\" target=\"_blank\" rel=\"noopener\">Asset Inventory<\/a>, use the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>hw:\"RUGGEDCOM\" OR hw:\"SCALANCE\" OR hw:\"LOGO\"<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><hr \/><h2 id=\"cve-2024-35292-simatic-s7-200-smart-devices\">CVE-2024-35292 &#8211;\u00a0SIMATIC S7-200 SMART Devices\u00a0(July 2024)<\/h2><p dir=\"ltr\">In July 2024,\u00a0Siemens\u00a0<a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-481506.html\" target=\"_blank\" rel=\"noopener\">disclosed a vulnerability<\/a>\u00a0in their SIMATIC S7-200 SMART Devices.<\/p><p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-35292\" target=\"_blank\" rel=\"noopener\">CVE-2024-35292<\/a> is rated <strong><em>high<\/em><\/strong>, with a CVSS score of 8.2, and allowed attackers to predict IP ID sequence numbers as their base method of attack and eventually could allow an attacker to create a denial-of-service condition.<\/p><p>Successful exploitation of this vulnerability would allow an attacker to issue a denial-of-service condition.<\/p><p>The only workaround was to restrict access to the network where the affected products were located by introducing strict access control mechanisms.<\/p><h3 id=\"how-to-find-potentially-vulnerable-systems\">How to find potentially vulnerable systems<\/h3><p dir=\"ltr\">From the <a href=\"https:\/\/console.runzero.com\/inventory\" target=\"_blank\" rel=\"noopener\">Asset Inventory<\/a>, runZero users applied the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>hw:SIMATIC<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><h2>\u00a0<\/h2><h2 id=\"sentron-scalance-and-ruggedcom-vulnerabilities\">SENTRON, SCALANCE, and RUGGEDCOM vulnerabilities (March 2024)<\/h2><p>In March, 2024,\u00a0Siemens released security advisories for a variety of products and devices, including the <strong>SENTRON<\/strong>, <strong>SCALANCE<\/strong>, and <strong>RUGGEDCOM<\/strong> product lines.<\/p><p dir=\"ltr\">Several of the vulnerabilities had CVSS scores in the 7.0 to 8.9 range (<em>high<\/em>) and several more in the 9.0 to 10.0 range (<em>critical<\/em>).<\/p><p dir=\"ltr\">For the full list of vulnerabilities, you can consult <a href=\"https:\/\/www.siemens.com\/global\/en\/products\/services\/cert.html#SiemensSecurityAdvisories\">Siemens ProductCERT<\/a>.<\/p><p>Several of these vulnerabilities allowed for unauthenticated remote code execution, allowing for compromise of the vulnerable systems. Other vulnerabilities could lead to privilege escalation, information disclosure, or denial of service. Users were urged to upgrade as quickly as possible.<\/p><p>Siemens released updates via a variety of channels. See <a href=\"https:\/\/www.siemens.com\/global\/en\/products\/services\/cert.html#SiemensSecurityAdvisories\">Siemens ProductCERT<\/a> for details.<\/p><h3 id=\"how-to-find-potentially-vulnerable-systems\">How to find potentially vulnerable systems<\/h3><p dir=\"ltr\">From the <a href=\"https:\/\/console.runzero.com\/inventory\">Asset Inventory<\/a>, runZero users applied the following query to locate Siemens assets that were potentially\u00a0vulnerable:<\/p><pre style=\"position: relative;\"><code>hardware:Siemens OR hardware:RuggedCom<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><p>\u00a0<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"55060\" class=\"elementor elementor-55060\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About runZero<\/strong><br \/>runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network\u2013without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Multiple vulnerabilities (February\u00a0 2025) Siemens discl [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[976,1305,61],"tags":[977,1077],"class_list":["post-103479","post","type-post","status-publish","format-standard","hentry","category-runzero","category-1305","category-press-release","tag-runzero","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to find Siemens devices on your network - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.runzero.com\/blog\/siemens-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to find Siemens devices on your network - Version 2\" \/>\n<meta property=\"og:description\" content=\"Multiple vulnerabilities (February\u00a0 2025) Siemens discl [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.runzero.com\/blog\/siemens-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-24T04:22:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/siemens-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/how-to-find-siemens-devices-on-your-network-2\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How to find Siemens devices on your network\",\"datePublished\":\"2025-02-24T04:22:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/how-to-find-siemens-devices-on-your-network-2\\\/\"},\"wordCount\":1281,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"runZero\",\"2025\"],\"articleSection\":[\"runZero\",\"2025\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/siemens-devices\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/how-to-find-siemens-devices-on-your-network-2\\\/\",\"url\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/siemens-devices\\\/\",\"name\":\"How to find Siemens devices on your network - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2025-02-24T04:22:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/siemens-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/siemens-devices\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/siemens-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to find Siemens devices on your network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to find Siemens devices on your network - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.runzero.com\/blog\/siemens-devices\/","og_locale":"en_US","og_type":"article","og_title":"How to find Siemens devices on your network - Version 2","og_description":"Multiple vulnerabilities (February\u00a0 2025) Siemens discl [&hellip;]","og_url":"https:\/\/www.runzero.com\/blog\/siemens-devices\/","og_site_name":"Version 2","article_published_time":"2025-02-24T04:22:50+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.runzero.com\/blog\/siemens-devices\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/02\/how-to-find-siemens-devices-on-your-network-2\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How to find Siemens devices on your network","datePublished":"2025-02-24T04:22:50+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/02\/how-to-find-siemens-devices-on-your-network-2\/"},"wordCount":1281,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["runZero","2025"],"articleSection":["runZero","2025","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.runzero.com\/blog\/siemens-devices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/02\/how-to-find-siemens-devices-on-your-network-2\/","url":"https:\/\/www.runzero.com\/blog\/siemens-devices\/","name":"How to find Siemens devices on your network - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2025-02-24T04:22:50+00:00","breadcrumb":{"@id":"https:\/\/www.runzero.com\/blog\/siemens-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.runzero.com\/blog\/siemens-devices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.runzero.com\/blog\/siemens-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How to find Siemens devices on your network"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-qV1","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/103479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=103479"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/103479\/revisions"}],"predecessor-version":[{"id":103486,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/103479\/revisions\/103486"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=103479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=103479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=103479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}