Skip to main content

CVE-2024-23813: CWE-287: Improper Authentication in Siemens Polarion ALM

High
VulnerabilityCVE-2024-23813cvecve-2024-23813cwe-287
Published: Tue Feb 13 2024 (02/13/2024, 09:00:25 UTC)
Source: CVE
Vendor/Project: Siemens
Product: Polarion ALM

Description

A vulnerability has been identified in Polarion ALM (All versions < V2404.0). The REST API endpoints of doorsconnector of the affected product lacks proper authentication. An unauthenticated attacker could access the endpoints, and potentially execute code.

AI-Powered Analysis

AILast updated: 07/05/2025, 00:41:42 UTC

Technical Analysis

CVE-2024-23813 is a high-severity vulnerability affecting Siemens Polarion ALM versions prior to V2404.0. The issue stems from improper authentication (CWE-287) in the REST API endpoints related to the 'doorsconnector' component of the product. Specifically, these endpoints do not enforce proper authentication controls, allowing unauthenticated attackers to access them. This lack of authentication means that an attacker can interact with the API without any credentials or user interaction, potentially leading to unauthorized actions including code execution. The vulnerability has a CVSS 3.1 base score of 7.3, indicating a high level of risk. The vector details show that the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality, integrity, and availability to a low to medium degree (C:L/I:L/A:L). The scope is unchanged (S:U), and exploit code is potentially available (E:P), although no known exploits in the wild have been reported yet. Siemens has not yet published patch links, indicating that remediation may still be pending or in progress. Given the nature of the vulnerability, an attacker could leverage the unauthenticated access to the REST API to execute arbitrary code or perform unauthorized operations within the Polarion ALM environment, potentially compromising the integrity and availability of the software lifecycle management processes it supports.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for those in industries relying heavily on Siemens Polarion ALM for application lifecycle management, such as automotive, aerospace, manufacturing, and critical infrastructure sectors. Unauthorized code execution or manipulation of ALM data could lead to corrupted project data, intellectual property theft, or disruption of development workflows. This could delay product releases, cause compliance issues, or introduce backdoors into software products. Given the critical role of ALM tools in managing software development and quality assurance, exploitation could undermine the integrity of software products developed by European companies, potentially affecting supply chains and safety-critical systems. Additionally, the lack of authentication increases the attack surface, making it easier for threat actors to exploit the vulnerability remotely without insider access or user interaction, raising the risk of widespread exploitation if the vulnerability becomes publicly known and weaponized.

Mitigation Recommendations

European organizations using Siemens Polarion ALM should immediately assess their exposure to this vulnerability by identifying all instances of Polarion ALM in their environment and verifying the version in use. Until an official patch is released, organizations should implement network-level access controls to restrict access to the doorsconnector REST API endpoints, such as firewall rules limiting access to trusted IP addresses or VPN-only access. Employing Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized API calls can provide additional protection. Monitoring and logging API access attempts should be enhanced to detect suspicious or anomalous activity. Organizations should also review and tighten overall access controls and authentication mechanisms around their ALM infrastructure. Once Siemens releases a patch, prompt application of the update is critical. Additionally, organizations should consider isolating the ALM environment from the internet and untrusted networks to reduce exposure. Conducting a thorough security review of integrations and customizations involving the doorsconnector API is recommended to identify any additional risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2024-01-22T17:44:56.763Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd7580

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 12:41:42 AM

Last updated: 8/11/2025, 10:14:16 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats