Skip to main content

CVE-2023-50236: CWE-276: Incorrect Default Permissions in Siemens Polarion ALM

High
VulnerabilityCVE-2023-50236cvecve-2023-50236cwe-276
Published: Tue Feb 13 2024 (02/13/2024, 09:00:02 UTC)
Source: CVE
Vendor/Project: Siemens
Product: Polarion ALM

Description

A vulnerability has been identified in Polarion ALM (All versions < V2404.0). The affected product is vulnerable due to weak file and folder permissions in the installation path. An attacker with local access could exploit this vulnerability to escalate privileges to NT AUTHORITY\SYSTEM.

AI-Powered Analysis

AILast updated: 07/05/2025, 08:11:55 UTC

Technical Analysis

CVE-2023-50236 is a high-severity vulnerability affecting Siemens Polarion ALM versions prior to V2404.0. The root cause is incorrect default permissions (CWE-276) on files and folders within the installation directory. Specifically, the permissions are weak enough that a local attacker with limited privileges can modify or replace files critical to the application or system operation. Exploiting this flaw allows privilege escalation to NT AUTHORITY\SYSTEM, the highest level of privilege on Windows systems. The vulnerability requires local access and low attack complexity, with no user interaction needed. The CVSS 3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the potential for an attacker to gain full system control makes this a significant threat. Siemens Polarion ALM is a widely used Application Lifecycle Management tool, often deployed in engineering and manufacturing environments, which are critical sectors. The vulnerability arises from improper default ACLs set during installation, allowing unauthorized modification of executable or configuration files. This can lead to arbitrary code execution with SYSTEM privileges, complete system compromise, and potential lateral movement within networks.

Potential Impact

For European organizations, especially those in manufacturing, automotive, aerospace, and industrial automation sectors where Siemens Polarion ALM is commonly used, this vulnerability poses a serious risk. An attacker who gains local access—via compromised credentials, phishing leading to local foothold, or insider threat—could escalate privileges to SYSTEM, bypassing security controls and gaining full control over the affected host. This could lead to theft or manipulation of intellectual property, disruption of critical development workflows, sabotage of product lifecycle data, and potential supply chain impacts. Given the critical nature of these industries in Europe, exploitation could have cascading effects on operational continuity and regulatory compliance. Additionally, the vulnerability could be leveraged as a stepping stone for broader network compromise, threatening enterprise-wide security.

Mitigation Recommendations

Organizations should immediately verify and correct file and folder permissions in the Polarion ALM installation directories to ensure they follow the principle of least privilege. Siemens should be contacted for official patches or updates, and organizations should prioritize upgrading to version V2404.0 or later once available. Until patches are applied, restrict local access to trusted users only, implement strict endpoint security controls, and monitor for unusual file modifications or privilege escalation attempts. Employ application whitelisting and integrity monitoring tools to detect unauthorized changes. Conduct regular audits of permissions and user privileges on systems running Polarion ALM. Additionally, strengthen network segmentation to limit lateral movement if a host is compromised. Implement robust logging and alerting for privilege escalation events and suspicious local activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2023-12-05T16:42:20.988Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8a48

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 8:11:55 AM

Last updated: 7/29/2025, 10:07:53 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats