Critical Infrastructure Security
,
Governance & Risk Management
,
Operational Technology (OT)
Heap Overflow Flaw Threatens Industrial Control Systems Globally
Siemens issued a security advisory for a critical vulnerability affecting industrial control systems in its User Management Component – or UMC – that could enable attackers to execute arbitrary code.
See Also: From Ancient Myths to Modern Threats: Securing the Transition from Legacy to Leading Edge
The heap-based buffer overflow flaw impacts products used in manufacturing and the energy sector. The flaw is tracked as CVE-2024-49775.
UMC is a central component in Siemens’ industrial automation suite, enabling system-wide user management. Affected products include Opcenter Execution Foundation, Opcenter Intelligence, SIMATIC PCS neo, SINEC NMS and Totally Integrated Automation Portal.
Those systems play a pivotal role in managing distributed control systems, network monitoring and industrial automation. The U.S. Cybersecurity and Infrastructure Security Agency said that these products are widely deployed across the globe.
The vulnerability was discovered by Tenable and disclosed Thursday. It stems from improper memory handling in UMC. If exploited, attackers could disrupt operations, exfiltrate data, or manipulate critical systems, Siemens said.
While Siemens issued fixes for certain products, including updates for SIMATIC PCS neo and SINEC NMS, other patches are still in development.
Siemens recommends restricting access to UMC-related ports 4002 and 4004 to trusted IP addresses and blocking port 4004 entirely if real-time servers are unnecessary.
Siemens also advises adhering to its operational guidelines for industrial security to secure IT environments effectively.
CISA reinforced Siemens’ recommendations, urging organizations to conduct impact analyses and deploy defensive measures. CISA emphasized the importance of defense-in-depth strategies and provided resources such as the ICS-TIP-12-146-01B technical paper on intrusion detection and mitigation strategies.
The agency said that there are no reports of public exploitation targeting this vulnerability but stressed the importance of vigilance and encouraged organizations to report any suspected malicious activity.