Publication Date:
Last Update:
Current Version: V1.5
CVSS v3.1 Base Score: 9.8
CVSS v4.0 Base Score: 9.3
Un-/Collapse All
Affected Product and Versions Remediation

All versions
affected by CVE-2024-33698
Currently no fix is available

All versions
affected by CVE-2024-33698
Currently no fix is available

All versions
affected by CVE-2024-33698
Currently no fix is available
Expand children

All versions
affected by CVE-2024-33698
Update UMC to V2.15.1.1 or later compatible version https://support.industry.siemens.com/cs/ww/en/view/109987708/

All versions < V3.2 SP3
affected by CVE-2024-33698
Expand children
  • CVE-2024-33698:
    • Filter the ports 4002 and 4004 to only accept connections to/from the IP addresses of machines that run UMC and are part of the UMC network e.g. with an external firewall
    • In addition if no RT server machines are used, port 4004 can be blocked completely

Product-specific remediations or mitigations can be found in the section Affected Products and Solution.
Please follow the General Security Recommendations.

As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity

Un-/Collapse All

This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.

CVSS v3.1 Base Score 9.8
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
CVSS v4.0 Base Score 9.3
CVSS v4.0 Vector CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-122: Heap-based Buffer Overflow

  • Tenable for coordinated disclosure

https://www.siemens.com/cert/advisories
V1.0 (2024-09-10): Publication Date
V1.1 (2024-10-08): Added fix for Totally Integrated Automation Portal (TIA Portal) V19 and clarified formulation for mitigation
V1.2 (2024-11-12): Added affected products Opcenter Execution Foundation, Opcenter Quality and Opcenter RDL. Added fix for Totally Integrated Automation Portal (TIA Portal) V18. Clarified no fix planned for product Totally Integrated Automation Portal (TIA Portal) V16
V1.3 (2025-01-14): Added fix for SIMATIC PCS neo V5.0. Removed SIMATIC Information Server 2022 and SIMATIC Information Server 2024 as not affected
V1.4 (2025-03-11): Added SINEMA Remote Connect Client as affected product including fix
V1.5 (2025-05-13): Updated remediation for SINEC NMS to point directly to the update of UMC