CVE-2024-44102

10.0 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to execute arbitrary code with SYSTEM privileges on Siemens TeleControl Server Basic systems by sending maliciously crafted serialized objects. It affects all versions below V3.1.2.1 when redundancy is configured. This is a critical remote code execution vulnerability affecting industrial control systems.

💻 Affected Systems

Products:
  • PP TeleControl Server Basic 1000 to 5000 V3.1 (6NH9910-0AA31-0AE1)
  • PP TeleControl Server Basic 256 to 1000 V3.1 (6NH9910-0AA31-0AD1)
  • PP TeleControl Server Basic 32 to 64 V3.1 (6NH9910-0AA31-0AF1)
  • PP TeleControl Server Basic 64 to 256 V3.1 (6NH9910-0AA31-0AC1)
  • PP TeleControl Server Basic 8 to 32 V3.1 (6NH9910-0AA31-0AB1)
  • TeleControl Server Basic 1000 V3.1 (6NH9910-0AA31-0AD0)
  • TeleControl Server Basic 256 V3.1 (6NH9910-0AA31-0AC0)
  • TeleControl Server Basic 32 V3.1 (6NH9910-0AA31-0AF0)
  • TeleControl Server Basic 5000 V3.1 (6NH9910-0AA31-0AE0)
  • TeleControl Server Basic 64 V3.1 (6NH9910-0AA31-0AB0)
  • TeleControl Server Basic 8 V3.1 (6NH9910-0AA31-0AA0)
  • TeleControl Server Basic Serv Upgr (6NH9910-0AA31-0GA1)
  • TeleControl Server Basic Upgr V3.1 (6NH9910-0AA31-0GA0)
Versions: All versions < V3.1.2.1
Operating Systems: Windows (implied by SYSTEM privileges)
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when redundancy is configured. Systems without redundancy configuration are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary code with SYSTEM privileges, potentially taking control of industrial control systems, disrupting operations, or causing physical damage.

🟠

Likely Case

Remote code execution leading to data theft, system manipulation, or ransomware deployment on industrial control networks.

🟢

If Mitigated

Limited impact if systems are isolated, properly segmented, and have redundancy disabled where possible.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation with maximum CVSS score indicates severe risk for internet-facing systems.
🏢 Internal Only: HIGH - Even internally, unauthenticated exploitation with SYSTEM privileges poses critical risk to industrial control environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated remote exploitation with maximum CVSS score suggests relatively straightforward exploitation once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.1.2.1

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-454789.html

Restart Required: Yes

Instructions:

1. Download V3.1.2.1 update from Siemens support portal. 2. Backup system configuration. 3. Apply update following Siemens installation guide. 4. Restart system. 5. Verify version is now V3.1.2.1 or higher.

🔧 Temporary Workarounds

Disable Redundancy

windows

Remove redundancy configuration if not required for operations

Configure via TeleControl Server Basic administration interface to disable redundancy features

Network Segmentation

all

Isolate TeleControl Server systems from untrusted networks

Configure firewall rules to restrict access to TeleControl Server ports from authorized systems only

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to TeleControl Server systems
  • Disable redundancy configuration if not operationally required

🔍 How to Verify

Check if Vulnerable:

Check TeleControl Server version via administration interface and verify redundancy is configured. Vulnerable if version < V3.1.2.1 AND redundancy enabled.

Check Version:

Check version in TeleControl Server Basic administration interface under System Information

Verify Fix Applied:

Verify version is V3.1.2.1 or higher in administration interface and test redundancy functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual serialization/deserialization errors
  • Unexpected process creation with SYSTEM privileges
  • Network connections to unusual external IPs

Network Indicators:

  • Unusual traffic patterns to TeleControl Server ports
  • Malformed serialized objects in network traffic

SIEM Query:

source="TeleControl Server" AND (event_type="deserialization_error" OR process_name="cmd.exe" OR process_name="powershell.exe")

🔗 References

📤 Share & Export