CVE-2024-44087

8.6 HIGH

📋 TL;DR

An integer overflow vulnerability in Siemens Automation License Manager allows unauthenticated remote attackers to crash the application via specially crafted network packets on port 4410/tcp. This denial of service prevents legitimate users from accessing products that rely on this license verification service. All users of affected Automation License Manager versions are vulnerable.

💻 Affected Systems

Products:
  • Siemens Automation License Manager
Versions: V5 (All versions), V6.0 (All versions < V6.0 SP12 Upd3), V6.2 (All versions < V6.2 Upd3)
Operating Systems: Windows (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: Port 4410/tcp must be accessible for exploitation. The service is typically used in industrial control systems and manufacturing environments.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for all products relying on license verification, potentially halting industrial operations until service is restored.

🟠

Likely Case

Service disruption causing temporary unavailability of licensed software features in industrial environments.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation via network packets makes internet-exposed instances extremely vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or malware could still exploit the vulnerability to disrupt operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending malformed packets to port 4410, which is relatively straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V6.0 SP12 Upd3, V6.2 Upd3

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-103653.html

Restart Required: Yes

Instructions:

1. Download the appropriate update from Siemens Industrial Security. 2. Stop the Automation License Manager service. 3. Install the update. 4. Restart the service. 5. Verify the version is updated.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to port 4410/tcp using firewall rules to only trusted systems.

Windows Firewall: New-NetFirewallRule -DisplayName "Block ALM Port" -Direction Inbound -LocalPort 4410 -Protocol TCP -Action Block
Linux iptables: iptables -A INPUT -p tcp --dport 4410 -j DROP

Service Isolation

all

Run Automation License Manager on a dedicated server with minimal network exposure.

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to port 4410/tcp to only absolutely necessary systems.
  • Monitor for unusual traffic patterns or repeated connection attempts to port 4410 and implement rate limiting where possible.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Automation License Manager against affected versions. If using V5, V6.0 < SP12 Upd3, or V6.2 < Upd3, the system is vulnerable.

Check Version:

Check via Siemens Automation License Manager interface or registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Siemens\Automation\License Manager\Version

Verify Fix Applied:

Verify the version is V6.0 SP12 Upd3 or V6.2 Upd3 or later. Test service functionality and monitor for crashes.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from Automation License Manager
  • Windows Event Logs showing service termination (Event ID 7034)

Network Indicators:

  • Unusual traffic patterns to port 4410/tcp
  • Multiple connection attempts from single sources

SIEM Query:

source="windows" AND (event_id=7034 AND process_name="*license*manager*") OR (destination_port=4410 AND protocol="tcp" AND bytes_sent>1000)

🔗 References

📤 Share & Export