Insufficient Session Expiration in Siemens Products



Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-45386
CWE-ID CWE-613
Exploitation vector Network
Public exploit N/A
Vulnerable software
SIMATIC PCS neo
Web applications / Other software

TIA Administrator (TIA Portal)
Server applications / SCADA systems

SIMOCODE ES
Server applications / SCADA systems

Totally Integrated Automation Portal (TIA Portal)
Other software / Other software solutions

SIRIUS Safety ES
Other software / Other software solutions

SIRIUS Soft Starter ES
Other software / Other software solutions

Vendor Siemens

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Insufficient Session Expiration

EUVDB-ID: #VU105437

Risk: High

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-45386

CWE-ID: CWE-613 - Insufficient Session Expiration

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient session expiration issue. A remote non-authenticated attacker can obtain or guess session token and gain unauthorized access to session that belongs to another user.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SIMATIC PCS neo: 4.0 - 5.0

TIA Administrator (TIA Portal): before 3.0.4

Totally Integrated Automation Portal (TIA Portal): before 19 Update 1

SIMOCODE ES: before 19 Update 1

SIRIUS Safety ES: before 19 Update 1

SIRIUS Soft Starter ES: before 19 Update 1

CPE2.3 External links

https://cert-portal.siemens.com/productcert/html/ssa-342348.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###