CVE-2024-54092

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to bypass authentication on specific API endpoints when identity federation is configured, enabling them to impersonate legitimate users. It affects multiple Siemens Industrial Edge Device Kit versions and related industrial devices. Successful exploitation requires that identity federation has been used and the attacker knows a legitimate user's identity.

💻 Affected Systems

Products:
  • Industrial Edge Device Kit - arm64
  • Industrial Edge Device Kit - x86-64
  • Industrial Edge Own Device (IEOD)
  • Industrial Edge Virtual Device
  • SCALANCE LPE9413 (6GK5998-3GS01-2AC2)
  • SIMATIC IPC BX-39A Industrial Edge Device
  • SIMATIC IPC BX-59A Industrial Edge Device
  • SIMATIC IPC127E Industrial Edge Device
  • SIMATIC IPC227E Industrial Edge Device
  • SIMATIC IPC427E Industrial Edge Device
  • SIMATIC IPC847E Industrial Edge Device
Versions: V1.17-V1.21 for Device Kits, V1.21.1-1-a for IEOD/Virtual Device, V2.1 for SCALANCE, V3.0 for SIMATIC IPC devices
Operating Systems: Linux-based industrial OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when identity federation is or has been configured. The attacker must know a legitimate user's identity.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, access sensitive industrial data, manipulate industrial processes, and pivot to other network segments.

🟠

Likely Case

Unauthorized access to industrial control systems, data exfiltration, manipulation of industrial processes, and potential disruption of operations.

🟢

If Mitigated

Limited impact if proper network segmentation, monitoring, and access controls are in place to detect and contain unauthorized access attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of legitimate user identities and that identity federation is configured. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V1.20.2-1, V1.21.1-1, V1.21.1-1-a, V2.1, V3.0 depending on product

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-634640.html

Restart Required: Yes

Instructions:

1. Identify affected devices and versions. 2. Download appropriate patches from Siemens Industrial Edge Hub. 3. Apply patches following Siemens documentation. 4. Restart devices as required. 5. Verify patch installation.

🔧 Temporary Workarounds

Disable Identity Federation

all

Temporarily disable identity federation configuration to prevent exploitation

Consult Siemens documentation for disabling identity federation on affected devices

Network Segmentation

all

Isolate affected devices from untrusted networks and implement strict firewall rules

🧯 If You Can't Patch

  • Implement strict network access controls to limit API endpoint exposure
  • Enable comprehensive logging and monitoring for authentication bypass attempts
  • Disable identity federation if not required
  • Implement additional authentication layers for critical functions

🔍 How to Verify

Check if Vulnerable:

Check device version against affected versions list and verify if identity federation is configured

Check Version:

Consult Siemens documentation for version checking commands specific to each device type

Verify Fix Applied:

Verify installed version is patched version or higher and test authentication enforcement on API endpoints

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Unusual API endpoint access patterns
  • Authentication bypass attempts in application logs

Network Indicators:

  • Unusual API traffic to authentication endpoints
  • Requests bypassing normal authentication flow

SIEM Query:

Example: 'source="industrial-edge" AND (event_type="auth_bypass" OR (auth_result="success" AND auth_method="none"))'

🔗 References

📤 Share & Export