CVE-2024-23813

7.3 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to access REST API endpoints in Polarion ALM's doorsconnector component, potentially enabling remote code execution. All Polarion ALM versions before V2404.0 are affected. Organizations using vulnerable versions are at risk of unauthorized system access.

💻 Affected Systems

Products:
  • Siemens Polarion ALM
Versions: All versions < V2404.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The doorsconnector REST API endpoints are vulnerable by default in affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Unauthorized access to sensitive application data, configuration manipulation, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to vulnerable endpoints.

🌐 Internet-Facing: HIGH - Unauthenticated access to REST API endpoints makes internet-facing instances particularly vulnerable to exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires network access to the vulnerable service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication, making exploitation straightforward for attackers who can reach the endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2404.0

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-871717.html

Restart Required: Yes

Instructions:

1. Download Polarion ALM V2404.0 from Siemens support portal. 2. Backup current installation and data. 3. Stop Polarion ALM service. 4. Install V2404.0 following vendor documentation. 5. Restart Polarion ALM service. 6. Verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Polarion ALM doorsconnector endpoints using firewall rules.

Application Firewall Rules

all

Implement web application firewall rules to block unauthorized access to vulnerable REST API endpoints.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Polarion ALM from untrusted networks
  • Deploy intrusion detection/prevention systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Polarion ALM version via web interface or configuration files. Versions below V2404.0 are vulnerable.

Check Version:

Check Polarion web interface or consult installation documentation for version information.

Verify Fix Applied:

Verify installation of V2404.0 and test that unauthenticated access to doorsconnector REST API endpoints is blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to doorsconnector REST endpoints
  • Unusual API calls to vulnerable endpoints

Network Indicators:

  • HTTP requests to doorsconnector endpoints without authentication headers
  • Unusual traffic patterns to Polarion ALM REST API

SIEM Query:

source="polarion" AND (uri="*doorsconnector*" OR endpoint="*doorsconnector*") AND auth_status="failed"

🔗 References

📤 Share & Export