CVE-2024-44102

Description

A vulnerability has been identified in PP TeleControl Server Basic 1000 to 5000 V3.1 (6NH9910-0AA31-0AE1) (All versions < V3.1.2.1 with redundancy configured), PP TeleControl Server Basic 256 to 1000 V3.1 (6NH9910-0AA31-0AD1) (All versions < V3.1.2.1 with redundancy configured), PP TeleControl Server Basic 32 to 64 V3.1 (6NH9910-0AA31-0AF1) (All versions < V3.1.2.1 with redundancy configured), PP TeleControl Server Basic 64 to 256 V3.1 (6NH9910-0AA31-0AC1) (All versions < V3.1.2.1 with redundancy configured), PP TeleControl Server Basic 8 to 32 V3.1 (6NH9910-0AA31-0AB1) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic 1000 V3.1 (6NH9910-0AA31-0AD0) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic 256 V3.1 (6NH9910-0AA31-0AC0) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic 32 V3.1 (6NH9910-0AA31-0AF0) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic 5000 V3.1 (6NH9910-0AA31-0AE0) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic 64 V3.1 (6NH9910-0AA31-0AB0) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic 8 V3.1 (6NH9910-0AA31-0AA0) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic Serv Upgr (6NH9910-0AA31-0GA1) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic Upgr V3.1 (6NH9910-0AA31-0GA0) (All versions < V3.1.2.1 with redundancy configured). The affected system allows remote users to send maliciously crafted objects. Due to insecure deserialization of user-supplied content by the affected software, an unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted serialized object. This could allow the attacker to execute arbitrary code on the device with SYSTEM privileges.

Category

10.0
CVSS
Severity: Critical
CVSS 4.0 •
CVSS 3.1 •
EPSS 1.47% Top 25%
Vendor Advisory siemens.com
Affected: Siemens PP TeleControl Server Basic 1000 to 5000 V3.1
Affected: Siemens PP TeleControl Server Basic 256 to 1000 V3.1
Affected: Siemens PP TeleControl Server Basic 32 to 64 V3.1
Affected: Siemens PP TeleControl Server Basic 64 to 256 V3.1
Affected: Siemens PP TeleControl Server Basic 8 to 32 V3.1
Affected: Siemens TeleControl Server Basic 1000 V3.1
Affected: Siemens TeleControl Server Basic 256 V3.1
Affected: Siemens TeleControl Server Basic 32 V3.1
Affected: Siemens TeleControl Server Basic 5000 V3.1
Affected: Siemens TeleControl Server Basic 64 V3.1
Affected: Siemens TeleControl Server Basic 8 V3.1
Affected: Siemens TeleControl Server Basic Serv Upgr
Affected: Siemens TeleControl Server Basic Upgr V3.1
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-44102?
CVE-2024-44102 has been scored as a critical severity vulnerability.
How to fix CVE-2024-44102?
To fix CVE-2024-44102, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-44102 being actively exploited in the wild?
It is possible that CVE-2024-44102 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-44102?
CVE-2024-44102 affects Siemens PP TeleControl Server Basic 1000 to 5000 V3.1, Siemens PP TeleControl Server Basic 256 to 1000 V3.1, Siemens PP TeleControl Server Basic 32 to 64 V3.1, Siemens PP TeleControl Server Basic 64 to 256 V3.1, Siemens PP TeleControl Server Basic 8 to 32 V3.1, Siemens TeleControl Server Basic 1000 V3.1, Siemens TeleControl Server Basic 256 V3.1, Siemens TeleControl Server Basic 32 V3.1, Siemens TeleControl Server Basic 5000 V3.1, Siemens TeleControl Server Basic 64 V3.1, Siemens TeleControl Server Basic 8 V3.1, Siemens TeleControl Server Basic Serv Upgr, Siemens TeleControl Server Basic Upgr V3.1.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.