Publication Date:
Last Update:
Current Version: V1.2
CVSS v3.1 Base Score: 9.8
CVSS v4.0 Base Score: 9.3
Un-/Collapse All
Affected Product and Versions Remediation

All versions
affected by CVE-2024-33698
Currently no fix is available

All versions
affected by CVE-2024-33698
Currently no fix is available

All versions
affected by CVE-2024-33698
Currently no fix is available
Expand children
Currently no fix is available
Expand children
Open for details

All versions
affected by CVE-2024-33698
Update UMC to V2.11.6. Contact customer support to receive patch and update information.
Expand children
Open for details
  • CVE-2024-33698:
    • Filter the ports 4002 and 4004 to only accept connections to/from the IP addresses of machines that run UMC and are part of the UMC network e.g. with an external firewall
    • In addition if no RT server machines are used, port 4004 can be blocked completely

Product-specific remediations or mitigations can be found in the section Affected Products and Solution.
Please follow the General Security Recommendations.

As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity

Un-/Collapse All

This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.

CVSS v3.1 Base Score 9.8
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
CVSS v4.0 Base Score 9.3
CVSS v4.0 Vector CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-122: Heap-based Buffer Overflow

  • Tenable for coordinated disclosure

https://www.siemens.com/cert/advisories
V1.0 (2024-09-10): Publication Date
V1.1 (2024-10-08): Added fix for Totally Integrated Automation Portal (TIA Portal) V19 and clarified formulation for mitigation
V1.2 (2024-11-12): Added affected products Opcenter Execution Foundation, Opcenter Quality and Opcenter RDL. Added fix for Totally Integrated Automation Portal (TIA Portal) V18. Clarified no fix planned for product Totally Integrated Automation Portal (TIA Portal) V16