Siemens Industrial Edge Management products have been found to contain a critical authorization bypass vulnerability, identified as CVE-2024-45032. The vulnerability, with a CVSS v4 score of 10.0, stems from improper validation of device tokens, allowing remote attackers to impersonate onboarded devices within the system. This flaw can be exploited by unauthenticated attackers, enabling them to impersonate legitimate devices and potentially disrupt operations. The vulnerability affects Siemens’ Industrial Edge Management Pro (versions prior to V1.9.5) and Industrial Edge Management Virtual (versions prior to V2.3.1-1), posing a significant security risk to industries relying on these systems.
Siemens has acknowledged the severity of the issue and has recommended immediate updates for affected products. For Industrial Edge Management Pro, users should update to version V1.9.5 or later, and for Industrial Edge Management Virtual, the update to version V2.3.1-1 or later is advised. These updates address the underlying issues and help mitigate the risk of exploitation. Siemens also emphasizes the importance of implementing additional network security measures to protect these devices, including proper firewall configurations and adherence to Siemens’ operational guidelines for industrial security.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also issued guidance to reduce the likelihood of exploitation. Recommendations include minimizing network exposure to control systems, ensuring they are not directly accessible from the internet. CISA also advises organizations to isolate control systems from business networks, use secure remote access methods such as VPNs, and continuously update these systems to mitigate vulnerabilities. Following these security practices is crucial to safeguard industrial control systems and reduce the risk of remote exploitation.
While there have been no reported cases of this vulnerability being exploited in the wild, the risk remains significant due to the high attack complexity and the potential for remote, unauthorized access. CISA and Siemens urge organizations to act promptly by implementing the necessary updates and securing their systems as outlined in the mitigation guidelines. As cyber threats to critical infrastructure continue to evolve, it is essential for organizations to proactively defend against vulnerabilities like this, ensuring their industrial assets remain protected from malicious activity.
Reference: