Siemens has reported a stack-based buffer overflow vulnerability in its Tecnomatix Plant Simulation software, affecting versions prior to V2302.0015 for Tecnomatix Plant Simulation V2302 and V2404.0004 for V2404. This vulnerability arises when the affected applications process specially crafted SPP files, which can lead to a situation where an attacker is able to execute arbitrary code within the context of the current process. The flaw has been assigned CVE-2024-41170, and it carries a CVSS v4 base score of 7.3, indicating that while the attack complexity is low, the potential impact could be significant.
The vulnerability primarily impacts critical infrastructure sectors, including energy, and is deployed across a wide range of locations globally. Siemens has recommended that users of the affected products update to the latest software versions—V2302.0015 for Tecnomatix Plant Simulation V2302 and V2404.0004 for V2404—so as to mitigate the risk. In addition to these updates, Siemens also advises against opening untrusted SPP files within the affected applications, as this is a common vector for exploiting the flaw.
To further reduce risk, Siemens recommends securing network access to affected systems and following its industrial security guidelines for safe operation within a protected IT environment. Protecting control systems from external exposure and minimizing internet access is key to preventing exploitation, as advised by both Siemens and CISA. When remote access is necessary, the use of secure methods like VPNs is encouraged, although organizations should remain mindful of the potential vulnerabilities in VPNs and ensure they are up to date.
CISA has emphasized that users should implement these recommendations to bolster their cybersecurity posture and protect industrial control systems from attack. Although no public exploitation of the vulnerability has been reported, organizations should be vigilant and report any suspicious activity to CISA. The ongoing development of cybersecurity strategies, such as defense-in-depth and targeted cyber intrusion detection, remains crucial in safeguarding industrial assets and preventing security breaches.
Reference: