Insecure TLS Protocol Vulnerability in Siemens SmartClient Modules
CVE-2024-41986

6.1MEDIUM

What is CVE-2024-41986?

A security flaw has been discovered in several Siemens SmartClient modules that support insecure TLS protocols (1.0 and 1.1). This vulnerability could allow attackers to execute man-in-the-middle attacks, compromising data confidentiality and integrity. The affected modules include Opcenter QL Home, SOA Audit, and SOA Cockpit, with versions spanning from V13.2 to prior to V2506. Organizations utilizing these products are advised to review their configurations and consider migrating to more secure TLS versions to safeguard their systems against potential exploits.

Affected Version(s)

SmartClient modules Opcenter QL Home (SC) V13.2

SOA Audit V13.2

SOA Cockpit V13.2

References

CVSS V4

Score:
6.1
Severity:
MEDIUM
Confidentiality:
High
Integrity:
Low
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2024-41986 : Insecure TLS Protocol Vulnerability in Siemens SmartClient Modules