Siemens SIMATIC S7-1500 and S7-1200 CPUs Open Redirect (CVE-2024-46886)

medium Tenable OT Security Plugin ID 502651

Synopsis

The remote OT asset is affected by a vulnerability.

Description

The web server of affected devices does not properly validate input that is used for a user redirection. This could allow an attacker to make the server redirect the legitimate user to an attacker-chosen URL. For a successful exploit, the legitimate user must actively click on an attacker-crafted link.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Siemens has released new versions for several affected products and recommends users update to the latest versions.

Please Refer to the vendor advisory.

See Also

https://cert-portal.siemens.com/productcert/html/ssa-876787.html

Plugin Details

Severity: Medium

ID: 502651

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 10/22/2024

Updated: 10/22/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 2.4

CVSS v3

Risk Factor: Medium

Base Score: 4.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Vulnerability Information

CPE: cpe:/o:siemens:simatic_s7-1500_cpu_firmware, cpe:/o:siemens:simatic_drive_controller_cpu_firmware, cpe:/o:siemens:siplus_et_200sp_cpu_firmware, cpe:/o:siemens:simatic_et_200sp_open_controller_cpu_1515sp_pc2_firmware, cpe:/o:siemens:simatic_s7-1500_cpu_firmware:3.1.4, cpe:/o:siemens:siplus_s7-1500_cpu_firmware, cpe:/o:siemens:simatic_s7-1200_cpu_firmware, cpe:/o:siemens:siplus_s7-1500_cpu_firmware:3.1.4, cpe:/o:siemens:simatic_s7-1500_et_200pro_cpu_firmware

Required KB Items: Tenable.ot/Siemens

Exploit Ease: No known exploits are available

Patch Publication Date: 10/8/2024

Vulnerability Publication Date: 10/8/2024

Reference Information

CVE: CVE-2024-46886

CWE: 601

ICSA: 24-284-01