CVE-2024-41797
BaseFortify
Publication date: 2025-06-10
Last updated on: 2025-06-12
Assigner: Siemens AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an incorrect authorization check in several Siemens Industrial Communication Devices running SINEC OS versions prior to V3.1. It allows an authenticated remote attacker with only 'guest' role permissions to execute an internal 'do system' command that exceeds their authorized privileges. The command permits certain low-risk actions, the most critical being the ability to clear the local system log. [1]
How can this vulnerability impact me? :
The vulnerability can allow an attacker with guest-level access to perform actions beyond their intended permissions, such as clearing the local system log. This could hinder forensic investigations or monitoring by removing evidence of malicious activity, potentially impacting the security and integrity of the affected devices. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, Siemens recommends updating all affected devices to version V3.1 or later. Additionally, protect network access to these devices using appropriate security mechanisms and follow Siemens' operational guidelines for Industrial Security. [1]