CVE-2024-23813
📋 TL;DR
This vulnerability allows unauthenticated attackers to access REST API endpoints in Polarion ALM's doorsconnector component, potentially enabling remote code execution. All Polarion ALM versions before V2404.0 are affected. Organizations using vulnerable versions are at risk of unauthorized system access.
💻 Affected Systems
- Siemens Polarion ALM
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, and lateral movement within the network.
Likely Case
Unauthorized access to sensitive application data, configuration manipulation, and potential privilege escalation.
If Mitigated
Limited impact with proper network segmentation and access controls preventing external access to vulnerable endpoints.
🎯 Exploit Status
The vulnerability requires no authentication, making exploitation straightforward for attackers who can reach the endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V2404.0
Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-871717.html
Restart Required: Yes
Instructions:
1. Download Polarion ALM V2404.0 from Siemens support portal. 2. Backup current installation and data. 3. Stop Polarion ALM service. 4. Install V2404.0 following vendor documentation. 5. Restart Polarion ALM service. 6. Verify functionality.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to Polarion ALM doorsconnector endpoints using firewall rules.
Application Firewall Rules
allImplement web application firewall rules to block unauthorized access to vulnerable REST API endpoints.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Polarion ALM from untrusted networks
- Deploy intrusion detection/prevention systems to monitor for exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check Polarion ALM version via web interface or configuration files. Versions below V2404.0 are vulnerable.
Check Version:
Check Polarion web interface or consult installation documentation for version information.
Verify Fix Applied:
Verify installation of V2404.0 and test that unauthenticated access to doorsconnector REST API endpoints is blocked.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated access attempts to doorsconnector REST endpoints
- Unusual API calls to vulnerable endpoints
Network Indicators:
- HTTP requests to doorsconnector endpoints without authentication headers
- Unusual traffic patterns to Polarion ALM REST API
SIEM Query:
source="polarion" AND (uri="*doorsconnector*" OR endpoint="*doorsconnector*") AND auth_status="failed"