Publication Date:
Last Update:
Current Version: V1.4
CVSS v3.1 Base Score: 9.8
CVSS v4.0 Base Score: 9.3
Un-/Collapse All
Affected Product and Versions Remediation

All versions < V2501.0001
affected by CVE-2024-49775
Update to V2501.0001 or later version

All versions < V2501.0001
affected by CVE-2024-49775
Update to V2501.0001 or later version

All versions < V2512
affected by CVE-2024-49775
Update to V2512 or later version

All versions < V2410
affected by CVE-2024-49775
Update to V2410 or later version
Expand children

All versions if operated in conjunction with UMC < V2.15
affected by CVE-2024-49775
Update UMC to V2.15.1.1 or later compatible version https://support.industry.siemens.com/cs/ww/en/view/109987708/
Expand children
Un-/Collapse All
Known Not Affected Products Reason

All versions
not affected by CVE-2024-49775
While TIA Portal is included as part of the ABT Site installation, neither ABT itself nor the incorporated TIA version uses or installs the affected User Management Component (UMC). As a result, any standalone ABT installation remains unaffected by this issue. (Component Not Present)
  • In addition if no RT server machines are used, port 4004 can be blocked completely
  • Filter the ports 4002 and 4004 to only accept connections to/from the IP addresses of machines that run UMC and are part of the UMC network e.g. with an external firewall

Product-specific remediations or mitigations can be found in the section Known Affected Products.
Please follow the General Security Recommendations.

As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity

Un-/Collapse All

This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.

CVSS v3.1 Base Score 9.8
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0 Base Score 9.3
CVSS v4.0 Vector CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-122: Heap-based Buffer Overflow

  • Tenable for coordinated disclosure

Totally Integrated Automation Portal (TIA Portal) V20 [1] incorporates a fixed UMC version that is not affected by CVE-2024-49775.

[1] https://support.industry.siemens.com/cs/document/109963850

https://www.siemens.com/cert/advisories
V1.0 (2024-12-16): Publication Date
V1.1 (2025-03-11): Added fix for SIMATIC PCS neo V4.1
V1.2 (2025-05-13): Added remediation for Totally Integrated Automation Portal (TIA Portal) V17, V18 and V19. Updated remediation for SINEC NMS to point directly to the update of UMC
V1.3 (2025-06-10): Added fix for Opcenter Execution Foundation, Opcenter Intelligence and Opcenter RDnL
V1.4 (2026-01-13): Added fix for Opcenter Quality