CVE-2024-54678
BaseFortify
Publication date: 2025-08-12
Last updated on: 2025-12-09
Assigner: Siemens AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| siemens | sirius_safety_es | 17 |
| siemens | simocode_es | 19 |
| siemens | simocode_es | 20 |
| siemens | simotion_scout_tia | 5.5 |
| siemens | simotion_scout_tia | 5.6 |
| siemens | simatic_wincc | 19 |
| siemens | simatic_pcs_neo | 4.1 |
| siemens | simocode_es | 17 |
| siemens | simotion_scout_tia | 5.7 |
| siemens | simocode_es | 18 |
| siemens | sirius_soft_starter_es | 18 |
| siemens | sinamics_startdrive | 20 |
| siemens | sirius_safety_es | 19 |
| siemens | sirius_safety_es | 20 |
| siemens | tia_portal_cloud | 19 |
| siemens | sirius_safety_es | 18 |
| siemens | simatic_step_7 | 19 |
| siemens | simatic_step_7 | 17 |
| siemens | tia_portal_cloud | 17 |
| siemens | tia_portal_test_suite | 20 |
| siemens | simatic_step_7 | 20 |
| siemens | sirius_soft_starter_es | 19 |
| siemens | simatic_pcs_neo | 6.0 |
| siemens | simatic_wincc | 17 |
| siemens | sinamics_startdrive | 19 |
| siemens | simatic_wincc | 20 |
| siemens | simatic_wincc | 18 |
| siemens | tia_portal_cloud | 20 |
| siemens | sinamics_startdrive | 18 |
| siemens | simatic_pcs_neo | 5.0 |
| siemens | simatic_step_7 | 18 |
| siemens | sirius_soft_starter_es | 17 |
| siemens | sirius_soft_starter_es | 20 |
| siemens | simatic_s7-plcsim | 17 |
| siemens | simotion_scout_tia | 5.4 |
| siemens | tia_portal_cloud | 18 |
| siemens | sinamics_startdrive | 17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a deserialization flaw in multiple Siemens engineering software products. It occurs because these products do not properly restrict access to a local Windows Named Pipe and fail to sanitize input received through it. This allows an authenticated local attacker to exploit type confusion and execute arbitrary code within the affected application, potentially gaining control over it. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability can allow a local authenticated attacker to execute arbitrary code within the affected application, potentially leading to full compromise of the software's functionality and its privilege context. This could result in unauthorized control over engineering and commissioning processes of Siemens automation hardware and systems, impacting operational integrity and security. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves improper sanitization of input received through a Windows Named Pipe accessible to all local users. Detection can focus on monitoring or inspecting access to Windows Named Pipes used by affected Siemens products. However, no specific detection commands or tools are provided in the available resources. General detection might involve auditing named pipe permissions and monitoring for unusual local access or attempts to interact with these pipes, but exact commands are not specified. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include running affected software on Windows hosts configured with only a single user on desktop systems, and restricting operating system-level access to administrators only on server systems. Users should also protect network access with appropriate security mechanisms and configure environments according to Siemens' operational guidelines for Industrial Security. Additionally, updating affected products to the latest versions or patches where available is strongly recommended. For products without available fixes, applying these mitigations is critical to reduce risk. [1]