CVE-2024-47783

7.8 HIGH

📋 TL;DR

A local privilege escalation vulnerability exists in SIPORT software where improper file permissions allow unprivileged local users to modify service executables. This affects all SIPORT versions before V3.4.0, enabling attackers to gain elevated privileges on affected systems.

💻 Affected Systems

Products:
  • SIPORT
Versions: All versions < V3.4.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installations where installation folders have overly permissive file permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full system control, installs persistent backdoors, accesses sensitive data, and pivots to other systems in the network.

🟠

Likely Case

Local user or malware with basic access escalates to administrative privileges, modifies system files, and maintains persistence on the compromised host.

🟢

If Mitigated

Attack is prevented through proper file permission controls, limiting local user access, and implementing least privilege principles.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system, not directly exploitable over the network.
🏢 Internal Only: HIGH - Internal users, contractors, or compromised accounts with local access can exploit this to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is technically simple - involves modifying files in improperly secured directories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.4.0 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-064257.html

Restart Required: Yes

Instructions:

1. Download SIPORT V3.4.0 or later from Siemens support portal. 2. Backup current configuration. 3. Run installer with administrative privileges. 4. Restart system after installation completes.

🔧 Temporary Workarounds

Restrict installation folder permissions

all

Manually set proper file permissions on SIPORT installation directories to prevent unauthorized modifications.

Windows: icacls "C:\Program Files\SIPORT" /inheritance:r /grant:r "Administrators:(OI)(CI)F" "SYSTEM:(OI)(CI)F"
Linux: chmod 750 /opt/siport && chown root:root /opt/siport -R

🧯 If You Can't Patch

  • Implement strict access controls limiting local user accounts to only necessary functions
  • Monitor file integrity of SIPORT installation directories using FIM tools

🔍 How to Verify

Check if Vulnerable:

Check SIPORT version via application interface or registry (Windows: HKEY_LOCAL_MACHINE\SOFTWARE\Siemens\SIPORT\Version) and verify if < V3.4.0

Check Version:

Windows: reg query "HKLM\SOFTWARE\Siemens\SIPORT" /v Version | Linux: cat /opt/siport/version.txt

Verify Fix Applied:

Confirm version is V3.4.0 or later and verify installation folder permissions restrict write access to non-administrative users

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file modifications in SIPORT installation directories
  • Unexpected privilege escalation events
  • Service executable hash mismatches

Network Indicators:

  • None - this is a local attack

SIEM Query:

EventID=4663 OR EventID=4656 AND ObjectName="*SIPORT*" AND AccessMask="0x2" (Windows) OR audit logs showing chmod/chown on SIPORT directories (Linux)

🔗 References

📤 Share & Export