Publication Date:
Last Update:
Current Version: V1.0
CVSS v3.1 Base Score: 7.6
CVSS v4.0 Base Score: 6.1
Affected Product and Versions Remediation

All versions < V3.1 SP1
affected by all CVEs
Update to V3.1 SP1 or later version
In order to fully mitigate the issue, administrators are advised to backup and clear the log files and to change the VPN credentials.

Product-specific remediations or mitigations can be found in the section Affected Products and Solution.
Please follow the General Security Recommendations.

As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity

Un-/Collapse All

This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.

CVSS v3.1 Base Score 7.6
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:P/RL:O/RC:C
CVSS v4.0 Base Score 6.1
CVSS v4.0 Vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N
CWE CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory

https://www.siemens.com/cert/advisories

V1.0 (2024-03-12): Publication Date