CVE-2024-30207

10.0 CRITICAL

📋 TL;DR

This vulnerability affects multiple SIMATIC RTLS Locating Manager products where communication between client and server is protected using symmetric cryptography with a hard-coded key. An unauthenticated remote attacker who can intercept network traffic and obtain the hard-coded key could compromise communication confidentiality and integrity, potentially leading to system availability issues. All versions before V3.0.1.1 of the listed products are affected.

💻 Affected Systems

Products:
  • SIMATIC RTLS Locating Manager (6GT2780-0DA00)
  • SIMATIC RTLS Locating Manager (6GT2780-0DA10)
  • SIMATIC RTLS Locating Manager (6GT2780-0DA20)
  • SIMATIC RTLS Locating Manager (6GT2780-0DA30)
  • SIMATIC RTLS Locating Manager (6GT2780-1EA10)
  • SIMATIC RTLS Locating Manager (6GT2780-1EA20)
  • SIMATIC RTLS Locating Manager (6GT2780-1EA30)
Versions: All versions < V3.0.1.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All affected products use the same vulnerable cryptographic implementation by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to intercept, modify, or block all communications, potentially disrupting RTLS operations and causing availability issues in industrial environments.

🟠

Likely Case

Unauthorized access to sensitive location data and potential manipulation of RTLS communications, though exploitation requires network interception capability and knowledge of the hard-coded key.

🟢

If Mitigated

Limited impact if systems are isolated in protected networks with strict access controls and monitoring, though the fundamental cryptographic weakness remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network interception capability and knowledge of the hard-coded key, which may be obtained through reverse engineering or other means.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.0.1.1

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-093430.html

Restart Required: Yes

Instructions:

1. Download V3.0.1.1 update from Siemens support portal. 2. Backup current configuration. 3. Install the update following Siemens documentation. 4. Restart the system. 5. Verify successful update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate RTLS systems in protected network segments to limit exposure and prevent network interception attacks.

Network Monitoring

all

Implement network monitoring and intrusion detection for suspicious traffic patterns between RTLS clients and servers.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RTLS systems from untrusted networks.
  • Deploy network monitoring and intrusion detection systems to detect potential exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check installed version in SIMATIC RTLS Locating Manager interface or Windows Programs and Features. If version is below V3.0.1.1, system is vulnerable.

Check Version:

Check application interface or Windows Control Panel > Programs and Features for SIMATIC RTLS Locating Manager version.

Verify Fix Applied:

Verify version shows V3.0.1.1 or higher in the application interface or Windows Programs and Features.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication failures
  • Unexpected connection attempts to RTLS ports
  • Configuration changes not initiated by administrators

Network Indicators:

  • Unusual traffic patterns between RTLS clients and servers
  • Suspicious network interception attempts
  • Unexpected protocol usage

SIEM Query:

source="rtls_logs" AND (event_type="authentication_failure" OR event_type="connection_attempt" OR event_type="config_change")

🔗 References

📤 Share & Export