A critical heap-based buffer overflow vulnerability (CVE-2024-49775) in Siemens’ User Management Component (UMC) allows unauthenticated remote attackers to execute arbitrary code. This flaw affects multiple Siemens products and poses a severe risk to industrial and enterprise environments. Siemens has issued security advisory SSA-928984, urging customers to apply fixes or mitigations immediately to prevent exploitation. This vulnerability highlights the dangers of outdated and vulnerable industrial control systems.
A vulnerability has been discovered in Siemens SIMATIC CP, a programmable logic controller. This vulnerability could allow unauthenticated attackers to gain access to the system’s filesystem, potentially compromising its security and integrity. The vulnerability affects SIMATIC CP1543-1, version 4.0 (6GK7543-1AX10-0XE0). The vulnerability stems from incorrect authorization handling, enabling attackers to exploit the system’s lack of authentication controls. Attackers could potentially gain unauthorized access to the filesystem, potentially enabling them to modify system files, steal sensitive data, or even execute malicious code.
To mitigate this risk, Siemens recommends updating to SIMATIC CP1543-1 version 4.0.50 or later. They also advise restricting access to port 8448/tcp to trusted systems only. Additionally, users should implement general security measures like protecting network access with appropriate mechanisms and configuring the environment according to Siemens’ recommendations.