First published: Mon Dec 16 2024(Updated: )
A vulnerability has been identified in Opcenter Execution Foundation (All versions), Opcenter Intelligence (All versions), Opcenter Quality (All versions), Opcenter RDL (All versions), SIMATIC PCS neo V4.0 (All versions), SIMATIC PCS neo V4.1 (All versions < V4.1 Update 3), SIMATIC PCS neo V5.0 (All versions < V5.0 Update 1), SINEC NMS (All versions if operated in conjunction with UMC < V2.15), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions). Affected products contain a heap-based buffer overflow vulnerability in the integrated UMC component. This could allow an unauthenticated remote attacker to execute arbitrary code.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Opcenter Execution Foundation | <=All versions | |
Siemens Opcenter Intelligence | <=All versions | |
Siemens Opcenter Quality | <=All versions | |
Siemens Opcenter RD&L | <=All versions | |
Siemens Simatic PCS neo Firmware | <=4.0<undefined<undefined | |
Siemens SINEC NMS SP1 Update 1 | <=All versions if operated in conjunction with UMC < 2.15 | |
Siemens TIA Portal | <=16<=17<=18<=19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49775 has been rated as a critical vulnerability affecting multiple Siemens products.
To fix CVE-2024-49775, update all affected Siemens software to their latest versions as recommended by Siemens.
CVE-2024-49775 affects Opcenter Execution Foundation, Opcenter Intelligence, Opcenter Quality, Opcenter RDL, and SIMATIC PCS neo across various versions.
Yes, CVE-2024-49775 is considered remotely exploitable, potentially allowing unauthorized access to affected systems.
The potential impacts of CVE-2024-49775 include unauthorized data access, disruption of services, and compromise of critical operations.