Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31486: CWE-312: Cleartext Storage of Sensitive Information in Siemens OPUPI0 AMQP/MQTT

0
Medium
VulnerabilityCVE-2024-31486cvecve-2024-31486cwe-312
Published: Tue May 14 2024 (05/14/2024, 10:02:26 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: OPUPI0 AMQP/MQTT

Description

A vulnerability has been identified in OPUPI0 AMQP/MQTT (All versions < V5.30). The affected devices stores MQTT client passwords without sufficient protection on the devices. An attacker with remote shell access or physical access could retrieve the credentials leading to confidentiality loss.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:15:07 UTC

Technical Analysis

CVE-2024-31486 identifies a security weakness in Siemens OPUPI0 AMQP/MQTT software versions prior to 5.30, where MQTT client passwords are stored without adequate protection, specifically in cleartext on the device. This vulnerability is categorized under CWE-312, which concerns the cleartext storage of sensitive information. The affected product is used for AMQP and MQTT messaging protocols, commonly employed in industrial automation and IoT environments for device communication. An attacker who gains remote shell access with low privileges or physical access to the device can extract these stored credentials, compromising the confidentiality of MQTT client authentication data. The vulnerability does not affect data integrity or availability directly, nor does it require user interaction to exploit. The CVSS 3.1 base score is 5.3, indicating a medium severity level, with the vector reflecting network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). No patches or exploits are currently publicly available, but the risk remains significant due to the sensitive nature of the credentials and the potential for lateral movement or further compromise if credentials are harvested. Siemens recommends upgrading to version 5.30 or later where this issue is resolved. The vulnerability highlights the importance of secure credential storage in embedded and industrial communication devices.

Potential Impact

For European organizations, particularly those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a confidentiality risk. Compromise of MQTT client credentials could allow attackers to impersonate legitimate devices or intercept sensitive messaging traffic, potentially leading to unauthorized access to control systems or data exfiltration. Although the vulnerability requires at least low privilege remote shell or physical access, environments with weak access controls or exposed management interfaces are at higher risk. The impact is primarily on confidentiality, but this could cascade into broader operational risks if attackers leverage stolen credentials for further attacks. Given Siemens' strong presence in European industrial sectors, the vulnerability could affect a wide range of organizations, including utilities, manufacturing plants, and transportation systems. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often target industrial control systems. The medium severity score reflects a moderate but non-trivial risk that should be addressed promptly to prevent potential compromise and data leakage.

Mitigation Recommendations

1. Upgrade Siemens OPUPI0 AMQP/MQTT software to version 5.30 or later where the vulnerability is fixed. 2. Restrict remote shell access to trusted administrators only and enforce strong authentication and network segmentation to limit exposure. 3. Implement physical security controls to prevent unauthorized physical access to devices. 4. Where upgrading is not immediately possible, consider encrypting stored credentials at rest using device-level encryption or secure storage modules. 5. Monitor device logs and network traffic for unusual access patterns or credential usage indicative of compromise. 6. Conduct regular security audits and vulnerability assessments on industrial communication devices. 7. Educate operational technology (OT) staff on the risks of credential exposure and best practices for device management. 8. Apply network-level protections such as firewall rules and intrusion detection systems to detect and block unauthorized access attempts to affected devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2024-04-04T11:43:06.066Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909214afe7723195e0544e6

Added to database: 11/3/2025, 9:40:26 PM

Last enriched: 11/3/2025, 10:15:07 PM

Last updated: 11/5/2025, 1:52:20 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats