8.8

CVE-2024-45386

A vulnerability has been identified in SIMATIC PCS neo V4.0 (All versions), SIMATIC PCS neo V4.1 (All versions < V4.1 Update 2), SIMATIC PCS neo V5.0 (All versions < V5.0 Update 1), SIMOCODE ES V19 (All versions < V19 Update 1), SIRIUS Safety ES V19 (TIA Portal) (All versions < V19 Update 1), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions < V19 Update 1), TIA Administrator (All versions < V3.0.4). Affected products do not correctly invalidate user sessions upon user logout. This could allow a remote unauthenticated attacker, who has obtained the session token by other means, to re-use a legitimate user's session even after logout.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorSiemens
Product SIMATIC PCS neo V4.0
Default Statusunknown
Version < *
Version 0
Status affected
VendorSiemens
Product SIMATIC PCS neo V4.1
Default Statusunknown
Version < V4.1 Update 2
Version 0
Status affected
VendorSiemens
Product SIMATIC PCS neo V5.0
Default Statusunknown
Version < V5.0 Update 1
Version 0
Status affected
VendorSiemens
Product SIMOCODE ES V19
Default Statusunknown
Version < V19 Update 1
Version 0
Status affected
VendorSiemens
Product SIRIUS Safety ES V19 (TIA Portal)
Default Statusunknown
Version < V19 Update 1
Version 0
Status affected
VendorSiemens
Product SIRIUS Soft Starter ES V19 (TIA Portal)
Default Statusunknown
Version < V19 Update 1
Version 0
Status affected
VendorSiemens
Product TIA Administrator
Default Statusunknown
Version < V3.0.4
Version 0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.13% 0.334
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
productcert@siemens.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
productcert@siemens.com 8.7 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-613 Insufficient Session Expiration

According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."