Siemens has released a security update addressing a session fixation vulnerability in the SINEMA Remote Connect Server, identified as CVE-2024-42345. This vulnerability, classified as low-risk, arises because the application fails to properly handle user session establishment and invalidation. A remote attacker could exploit this flaw to bypass multi-factor authentication and potentially gain unauthorized access to the affected system. Although the vulnerability does not have a public exploit, the potential for remote exploitation exists, making it critical for users to apply the available patch.
The vulnerability affects versions of SINEMA Remote Connect Server prior to 3.2 SP2. Siemens has assigned a CVSS v3.1 score of 3.8 to this issue, reflecting its low severity, but users are advised to upgrade to version 3.2 SP2 or later to mitigate the risk. The patch, available on Siemens’ website, resolves the issue by improving the handling of user sessions, which helps prevent attackers from bypassing additional authentication layers during session establishment.
Siemens has recommended a range of mitigations to protect devices from potential exploitation. Aside from upgrading to the fixed version of the software, users should also ensure network access to affected devices is secured using appropriate protective measures. Siemens emphasizes the importance of configuring the IT environment according to their operational guidelines for industrial security to further safeguard against potential security threats.
The impact of this vulnerability spans multiple critical infrastructure sectors, including critical manufacturing, healthcare, and energy. As Siemens’ SINEMA Remote Connect Server is used globally, the vulnerability could affect a broad range of organizations. Given the wide-reaching implications of this flaw, Siemens urges all users to take immediate action and install the update to ensure the security of their systems.
Reference: