Siemens has issued an advisory on vulnerabilities in its Remote Connect Server, with a release date of July 11, 2024. The advisory highlights multiple severe security issues, including incorrect user management, unrestricted file uploads, and improper permission handling. These flaws, assigned CVE identifiers ranging from CVE-2022-32260 to CVE-2024-39876, expose the server to various attacks, such as authentication bypass, privilege escalation, and remote code execution. The vulnerabilities collectively have a high CVSS v3 base score, with several critical ones rated up to 9.6.
The affected products include all versions of Siemens SINEMA Remote Connect Server prior to V3.2 SP1. Specific issues involve unsafe actions like improper handling of temporary files, unrestricted file uploads, and excessive authentication attempts, which could lead to denial-of-service conditions or unauthorized access. Attackers could exploit these vulnerabilities to gain elevated permissions, modify configurations, or execute arbitrary code, posing significant risks to industrial control systems.
To mitigate these risks, Siemens recommends updating to version V3.2 SP1 or later and securing network access using firewalls and VPNs. Siemens also advises adhering to operational security guidelines and applying updates promptly to reduce vulnerability exposure. The company’s industrial security webpage provides additional details on protecting devices and managing security effectively.
The Cybersecurity and Infrastructure Security Agency (CISA) also emphasizes minimizing network exposure and using secure methods for remote access. Organizations are encouraged to follow best practices for cybersecurity and perform thorough impact analyses before deploying defensive measures. CISA’s technical papers and guidance on industrial control systems are available for further reading and implementation.