First published: Tue Feb 11 2025(Updated: )
A vulnerability has been identified in SIMATIC PCS neo V4.0 (All versions), SIMATIC PCS neo V4.1 (All versions < V4.1 Update 2), SIMATIC PCS neo V5.0 (All versions < V5.0 Update 1), SIMOCODE ES V19 (All versions < V19 Update 1), SIRIUS Safety ES V19 (TIA Portal) (All versions < V19 Update 1), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions < V19 Update 1), TIA Administrator (All versions < V3.0.4). Affected products do not correctly invalidate user sessions upon user logout. This could allow a remote unauthenticated attacker, who has obtained the session token by other means, to re-use a legitimate user's session even after logout.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC PCS neo V4.0 | =4.0<4.1 Update 2<5.0 Update 1 | |
Siemens SIMOCODE ES | <19 Update 1 | |
Siemens SIRIUS Safety ES | <19 Update 1 | |
Siemens SIRIUS Soft Starter ES | <19 Update 1 | |
siemens tia administrator | <3.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-45386 has not been explicitly stated, but vulnerabilities in industrial control systems typically warrant urgent attention due to potential impacts on safety and security.
To fix CVE-2024-45386, update the affected software to the latest versions as specified in the vendor's security advisory.
CVE-2024-45386 affects all versions of SIMATIC PCS neo V4.0, all versions of V4.1 below V4.1 Update 2, and all versions of V5.0 below V5.0 Update 1.
CVE-2024-45386 impacts Siemens SIMATIC PCS neo, SIMOCODE ES, SIRIUS Safety ES, SIRIUS Soft Starter ES, and TIA Administrator.
Currently, no known workaround exists for CVE-2024-45386, so applying the updates is the recommended action.