Skip to main content

CVE-2024-44087: CWE-190: Integer Overflow or Wraparound in Siemens Automation License Manager V5

High
VulnerabilityCVE-2024-44087cvecve-2024-44087cwe-190
Published: Tue Sep 10 2024 (09/10/2024, 09:36:52 UTC)
Source: CVE
Vendor/Project: Siemens
Product: Automation License Manager V5

Description

A vulnerability has been identified in Automation License Manager V5 (All versions), Automation License Manager V6.0 (All versions < V6.0 SP12 Upd3), Automation License Manager V6.2 (All versions < V6.2 Upd3). Affected applications do not properly validate certain fields in incoming network packets on port 4410/tcp. This could allow an unauthenticated remote attacker to cause an integer overflow and crash of the application. This denial of service condition could prevent legitimate users from using subsequent products that rely on the affected application for license verification.

AI-Powered Analysis

AILast updated: 07/04/2025, 21:25:39 UTC

Technical Analysis

CVE-2024-44087 is a high-severity integer overflow vulnerability (CWE-190) affecting Siemens Automation License Manager versions V5 (all versions), V6.0 (all versions prior to V6.0 SP12 Update 3), and V6.2 (all versions prior to V6.2 Update 3). The vulnerability arises because the affected versions do not properly validate certain fields in incoming network packets received on TCP port 4410. An unauthenticated remote attacker can exploit this flaw by sending specially crafted packets that trigger an integer overflow or wraparound condition within the application. This overflow leads to a denial of service (DoS) by crashing the Automation License Manager service. Since this service is responsible for license verification for Siemens automation products, its unavailability can prevent legitimate users and dependent industrial control systems from validating licenses, potentially halting critical automation processes. The vulnerability has a CVSS 3.1 base score of 8.6, reflecting its high impact and ease of exploitation (network attack vector, no privileges or user interaction required). Although no known exploits are currently reported in the wild, the exposure of a network-facing service with no authentication makes this a significant risk, especially in industrial environments where Siemens automation products are widely deployed. The scope is considered changed (S:C) because the DoS affects the availability of downstream products relying on the license manager, potentially impacting multiple systems beyond the vulnerable host itself.

Potential Impact

For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that rely heavily on Siemens automation solutions, this vulnerability poses a substantial operational risk. The denial of service condition can disrupt license verification processes, leading to shutdowns or degraded performance of industrial control systems and automation workflows. This can cause production downtime, financial losses, and safety risks if automated safety or control systems fail to operate correctly. Given the critical role of Siemens automation products in European industrial environments, the impact extends beyond IT to operational technology (OT) domains, where availability is paramount. Additionally, the lack of authentication and network exposure increases the risk of remote exploitation by threat actors, including those motivated by sabotage or ransomware attacks targeting industrial operations. The potential cascading effect on multiple dependent systems amplifies the severity of this vulnerability in European industrial contexts.

Mitigation Recommendations

1. Immediate application of Siemens-provided patches or updates is the most effective mitigation. Organizations should verify if they are running affected versions and upgrade to V6.0 SP12 Update 3, V6.2 Update 3, or later versions where the vulnerability is fixed. 2. If patching is not immediately possible, restrict network access to TCP port 4410 using firewalls or network segmentation to limit exposure only to trusted management systems. 3. Implement strict network monitoring and intrusion detection rules to identify anomalous traffic targeting port 4410, including malformed packets that could exploit the integer overflow. 4. Conduct thorough inventory and asset management to identify all instances of Automation License Manager in the environment, including legacy systems. 5. Develop and test incident response plans specifically for industrial control system disruptions caused by license verification failures. 6. Engage with Siemens support and subscribe to their security advisories to receive timely updates and guidance. 7. Consider deploying application-layer gateways or proxies that can validate and sanitize incoming packets to the license manager service as an additional protective measure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2024-08-19T09:15:40.500Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd66be

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/4/2025, 9:25:39 PM

Last updated: 7/30/2025, 12:53:21 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats