Serielization Vulnerability in TeleControl Server Basic Could Allow Arbitrary Code Execution
CVE-2024-44102

10CRITICAL

Summary

A vulnerability in Siemens TeleControl Server products has been identified that allows remote attackers to exploit insecure deserialization mechanisms. Specifically, all versions of the TeleControl Server Basic products (Basic 8 to 5000 V3.1) and related upgrades that are below version V3.1.2.1, when configured with redundancy, are affected. An unauthenticated attacker can send specially crafted serialized objects to the affected systems, potentially leading to arbitrary code execution with SYSTEM privileges. This presents a significant security risk, necessitating immediate action to protect deployed systems.

Affected Version(s)

PP TeleControl Server Basic 1000 to 5000 V3.1 0

PP TeleControl Server Basic 256 to 1000 V3.1 0

PP TeleControl Server Basic 32 to 64 V3.1 0

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.