CVE-2024-45386

8.8 HIGH

📋 TL;DR

This vulnerability allows session hijacking in Siemens industrial control software. An attacker who obtains a valid session token can reuse it even after the legitimate user logs out. Affected products include SIMATIC PCS neo, SIMOCODE ES, SIRIUS Safety ES, SIRIUS Soft Starter ES, and TIA Administrator.

💻 Affected Systems

Products:
  • SIMATIC PCS neo V4.0
  • SIMATIC PCS neo V4.1
  • SIMATIC PCS neo V5.0
  • SIMOCODE ES V19
  • SIRIUS Safety ES V19 (TIA Portal)
  • SIRIUS Soft Starter ES V19 (TIA Portal)
  • TIA Administrator
Versions: SIMATIC PCS neo V4.0 (All versions), SIMATIC PCS neo V4.1 (All versions < V4.1 Update 2), SIMATIC PCS neo V5.0 (All versions < V5.0 Update 1), SIMOCODE ES V19 (All versions < V19 Update 1), SIRIUS Safety ES V19 (All versions < V19 Update 1), SIRIUS Soft Starter ES V19 (All versions < V19 Update 1), TIA Administrator (All versions < V3.0.4)
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains persistent unauthorized access to industrial control systems, potentially manipulating processes, stealing sensitive data, or causing operational disruption.

🟠

Likely Case

Session hijacking leads to unauthorized access with the privileges of the compromised user, allowing data theft or limited system manipulation.

🟢

If Mitigated

With network segmentation and strict access controls, impact is limited to isolated systems with minimal critical exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires obtaining a valid session token through other means (e.g., network sniffing, XSS).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SIMATIC PCS neo V4.1 Update 2, SIMATIC PCS neo V5.0 Update 1, SIMOCODE ES V19 Update 1, SIRIUS Safety ES V19 Update 1, SIRIUS Soft Starter ES V19 Update 1, TIA Administrator V3.0.4

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-342348.html

Restart Required: No

Instructions:

1. Identify affected products and versions. 2. Download updates from Siemens support portal. 3. Apply updates according to Siemens documentation. 4. Test in non-production environment first.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems from untrusted networks to reduce attack surface.

Session Timeout Reduction

all

Configure shorter session timeout values to limit token validity window.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure.
  • Monitor for unusual session activity and implement session revocation mechanisms.

🔍 How to Verify

Check if Vulnerable:

Check product version against affected versions list in Siemens advisory.

Check Version:

Product-specific commands vary; consult Siemens documentation for version checking.

Verify Fix Applied:

Verify installed version matches or exceeds patched versions listed in advisory.

📡 Detection & Monitoring

Log Indicators:

  • Multiple sessions from same token after logout
  • Unusual access patterns from unexpected IPs

Network Indicators:

  • Repeated use of same session token across multiple requests

SIEM Query:

Example: 'session_token re-use after logout event'

🔗 References

📤 Share & Export