Publication Date:
Last Update:
Current Version: V1.0
CVSS v3.1 Base Score: 9.8
CVSS v4.0 Base Score: 9.3
Un-/Collapse All
Affected Product and Versions Remediation

All versions
affected by CVE-2024-49775
Currently no fix is available

All versions
affected by CVE-2024-49775
Currently no fix is available

All versions
affected by CVE-2024-49775
Currently no fix is available

All versions
affected by CVE-2024-49775
Currently no fix is available
Expand children
Open for details

All versions if operated in conjunction with UMC < V2.15
affected by CVE-2024-49775
Update SINEC NMS to V3.0 SP2 or later version and UMC to V2.15 or later version. Contact customer support to receive patch and update information.
Expand children
Open for details
  • CVE-2024-49775:
    • Filter the ports 4002 and 4004 to only accept connections to/from the IP addresses of machines that run UMC and are part of the UMC network e.g. with an external firewall
    • In addition if no RT server machines are used, port 4004 can be blocked completely

Product-specific remediations or mitigations can be found in the section Affected Products and Solution.
Please follow the General Security Recommendations.

As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity

Un-/Collapse All

This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.

CVSS v3.1 Base Score 9.8
CVSS v3.1 Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
CVSS v4.0 Base Score 9.3
CVSS v4.0 Vector CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-122: Heap-based Buffer Overflow

  • Tenable for coordinated disclosure

Totally Integrated Automation Portal (TIA Portal) V20 [1] incorporates a fixed UMC version that is not affected by CVE-2024-49775.

[1] https://support.industry.siemens.com/cs/document/109963850

https://www.siemens.com/cert/advisories
V1.0 (2024-12-16): Publication Date