CVE-2024-33497

6.3 MEDIUM

📋 TL;DR

This vulnerability in SIMATIC RTLS Locating Manager allows authenticated local attackers to extract credentials from the Track Viewer Client. Attackers can use these credentials to escalate privileges from Manager to Systemadministrator role. All versions before V3.0.1.1 of multiple SIMATIC RTLS Locating Manager products are affected.

💻 Affected Systems

Products:
  • SIMATIC RTLS Locating Manager (6GT2780-0DA00)
  • SIMATIC RTLS Locating Manager (6GT2780-0DA10)
  • SIMATIC RTLS Locating Manager (6GT2780-0DA20)
  • SIMATIC RTLS Locating Manager (6GT2780-0DA30)
  • SIMATIC RTLS Locating Manager (6GT2780-1EA10)
  • SIMATIC RTLS Locating Manager (6GT2780-1EA20)
  • SIMATIC RTLS Locating Manager (6GT2780-1EA30)
Versions: All versions < V3.0.1.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Track Viewer Client component. Requires authenticated local access to the client system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains Systemadministrator privileges, potentially compromising the entire RTLS system, manipulating location data, or disrupting operations.

🟠

Likely Case

Privilege escalation within the RTLS system allowing unauthorized access to administrative functions and sensitive location data.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing credential extraction.

🌐 Internet-Facing: LOW - This requires local authenticated access to the Track Viewer Client.
🏢 Internal Only: HIGH - Local authenticated attackers can exploit this to gain administrative privileges within the RTLS system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access to the Track Viewer Client. Credential extraction mechanism not publicly detailed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.0.1.1

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-093430.html

Restart Required: Yes

Instructions:

1. Download V3.0.1.1 from Siemens support portal. 2. Backup current configuration. 3. Install the update following Siemens documentation. 4. Restart the RTLS Locating Manager system. 5. Verify functionality.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and network access to systems running the Track Viewer Client to trusted users only.

Implement Least Privilege

all

Ensure users only have necessary permissions and regularly audit access rights.

🧯 If You Can't Patch

  • Isolate RTLS systems on separate network segments with strict access controls.
  • Implement monitoring for unusual privilege escalation attempts within the RTLS system.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of SIMATIC RTLS Locating Manager in the software interface or Windows Programs and Features.

Check Version:

Check via SIMATIC RTLS Locating Manager interface or Windows Control Panel > Programs and Features.

Verify Fix Applied:

Confirm version is V3.0.1.1 or later in the software interface and test that credential extraction is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in RTLS logs
  • Multiple failed authentication attempts followed by successful Systemadministrator access

Network Indicators:

  • Unexpected connections from Track Viewer Client to administrative interfaces

SIEM Query:

source="rtls_logs" AND (event_type="privilege_escalation" OR user_role_change="Systemadministrator")

🔗 References

📤 Share & Export