ssa-382999
Vulnerability from csaf_siemens
Published
2025-08-12 00:00
Modified
2025-08-12 00:00
Summary
SSA-382999: Multiple Vulnerabilities in Opcenter Quality Before V2506

Notes

Summary
The Opcenter Quality is affected by multiple vulnerabilities in the SmartClient modules Opcenter QL Home (SC), SOA Audit and SOA Cockpit. Siemens has released new versions for the affected products and recommends to update to the latest versions.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.



{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "The Opcenter Quality is affected by multiple vulnerabilities in the SmartClient modules Opcenter QL Home (SC), SOA Audit and SOA Cockpit.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "productcert@siemens.com",
      "name": "Siemens ProductCERT",
      "namespace": "https://www.siemens.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-382999: Multiple Vulnerabilities in Opcenter Quality Before V2506 - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-382999.html"
      },
      {
        "category": "self",
        "summary": "SSA-382999: Multiple Vulnerabilities in Opcenter Quality Before V2506 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-382999.json"
      }
    ],
    "title": "SSA-382999: Multiple Vulnerabilities in Opcenter Quality Before V2506",
    "tracking": {
      "current_release_date": "2025-08-12T00:00:00Z",
      "generator": {
        "engine": {
          "name": "Siemens ProductCERT CSAF Generator",
          "version": "1"
        }
      },
      "id": "SSA-382999",
      "initial_release_date": "2025-08-12T00:00:00Z",
      "revision_history": [
        {
          "date": "2025-08-12T00:00:00Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        }
      ],
      "status": "interim",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=13.2|\u003c2506",
                "product": {
                  "name": "SmartClient modules Opcenter QL Home (SC)",
                  "product_id": "1"
                }
              }
            ],
            "category": "product_name",
            "name": "SmartClient modules Opcenter QL Home (SC)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=13.2|\u003c2506",
                "product": {
                  "name": "SOA Audit",
                  "product_id": "2"
                }
              }
            ],
            "category": "product_name",
            "name": "SOA Audit"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=13.2|\u003c2506",
                "product": {
                  "name": "SOA Cockpit",
                  "product_id": "3"
                }
              }
            ],
            "category": "product_name",
            "name": "SOA Cockpit"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-41979",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The affected application does not enforce mandatory authorization on some functionality level at server side. This could allow an authenticated attacker to gain complete access of the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "The SmartClient should be operated in a secured network and context only",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "mitigation",
          "details": "Remove all tools giving possibility to call SOAP-services outside from the SmartClient",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "mitigation",
          "details": "The hardening instructions mentioned in the products security concept should be followed",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V2506 or later version",
          "product_ids": [
            "1",
            "2",
            "3"
          ],
          "url": "https://support.sw.siemens.com/product/249261320/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3"
          ]
        }
      ],
      "title": "CVE-2024-41979"
    },
    {
      "cve": "CVE-2024-41980",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The affected application do not encrypt the communication in LDAP interface by default. This could allow an authenticated attacker to gain unauthorized access to sensitive information.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Harden LDAP-interface secure protocols by enabling the SSL-flag on configuration and a proper setup of your TLS-configuration",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "mitigation",
          "details": "All the users (including in LDAP) should be given the least privileges required",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V2506 or later version",
          "product_ids": [
            "1",
            "2",
            "3"
          ],
          "url": "https://support.sw.siemens.com/product/249261320/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3"
          ]
        }
      ],
      "title": "CVE-2024-41980"
    },
    {
      "cve": "CVE-2024-41982",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The affected application does not have adequate encryption of sensitive information. This could allow an authenticated attacker to gain access of sensitive information.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Limit the permission to access those fields using the least privilege strategy",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V2506 or later version",
          "product_ids": [
            "1",
            "2",
            "3"
          ],
          "url": "https://support.sw.siemens.com/product/249261320/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3"
          ]
        }
      ],
      "title": "CVE-2024-41982"
    },
    {
      "cve": "CVE-2024-41983",
      "cwe": {
        "id": "CWE-209",
        "name": "Generation of Error Message Containing Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The affected application displays SQL statement in the error messages encountered during the generation of reports using Cockpit tool.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Do not use original table structures and accounts for reporting. Create your own reporting accounts which have access via synonyms forwarding on views representing access to result-sets the user may use for evaluation",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "mitigation",
          "details": "Use DB-tools to limit load on productive systems for reporting accounts or use offline systems for reporting",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "mitigation",
          "details": "Harden your IIS",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "mitigation",
          "details": "Prevent any scanning of structures and configurations",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "mitigation",
          "details": "Limit the information to prevent to the end-user based on the need-to-know-principle to the minimum possible information",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V2506 or later version",
          "product_ids": [
            "1",
            "2",
            "3"
          ],
          "url": "https://support.sw.siemens.com/product/249261320/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3"
          ]
        }
      ],
      "title": "CVE-2024-41983"
    },
    {
      "cve": "CVE-2024-41984",
      "cwe": {
        "id": "CWE-209",
        "name": "Generation of Error Message Containing Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The affected application improperly handles error while accessing an inaccessible resource leading to exposing the system applications.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Hardening of the solution, including the OS and IIS, is required, with specific measures such as hiding the IIS version to enhance security",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "mitigation",
          "details": "Users should not have the possibility to scan folders and extensions of files allowed to open should be limited to the required one",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V2506 or later version",
          "product_ids": [
            "1",
            "2",
            "3"
          ],
          "url": "https://support.sw.siemens.com/product/249261320/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3"
          ]
        }
      ],
      "title": "CVE-2024-41984"
    },
    {
      "cve": "CVE-2024-41985",
      "cwe": {
        "id": "CWE-613",
        "name": "Insufficient Session Expiration"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The affected application does not expire the session without logout. This could allow an attacker to get unauthorized access if the session is left idle.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V2506 or later version",
          "product_ids": [
            "1",
            "2",
            "3"
          ],
          "url": "https://support.sw.siemens.com/product/249261320/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3"
          ]
        }
      ],
      "title": "CVE-2024-41985"
    },
    {
      "cve": "CVE-2024-41986",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The affected application support insecure TLS 1.0 and 1.1 protocol. An attacker could achieve a man-in-the-middle attack and compromise confidentiality and integrity of data.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Disable all protocols (SSL v2/v3, TLS 1.0, TLS 1.1) the solution should not use.",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "mitigation",
          "details": "Ensure, TLS 1.2 is enabled if you plan to use TLS 1.2.",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "mitigation",
          "details": "Follow the instructions of the security concept of Opcenter Quality and vendors.",
          "product_ids": [
            "1",
            "2",
            "3"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V2506 or later version",
          "product_ids": [
            "1",
            "2",
            "3"
          ],
          "url": "https://support.sw.siemens.com/product/249261320/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3"
          ]
        }
      ],
      "title": "CVE-2024-41986"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…