Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46887: CWE-288: Authentication Bypass Using an Alternate Path or Channel in Siemens SIMATIC Drive Controller CPU 1504D TF

0
Medium
VulnerabilityCVE-2024-46887cvecve-2024-46887cwe-288
Published: Tue Oct 08 2024 (10/08/2024, 08:40:43 UTC)
Source: CVE
Vendor/Project: Siemens
Product: SIMATIC Drive Controller CPU 1504D TF

Description

The web server of affected devices do not properly authenticate user request to the '/ClientArea/RuntimeInfoData.mwsl' endpoint. This could allow an unauthenticated remote attacker to gain knowledge about current actual and configured maximum cycle times as well as about configured maximum communication load.

AI-Powered Analysis

AILast updated: 10/21/2025, 16:30:02 UTC

Technical Analysis

CVE-2024-46887 is an authentication bypass vulnerability classified under CWE-288 affecting the Siemens SIMATIC Drive Controller CPU 1504D TF. The vulnerability arises because the embedded web server does not properly authenticate requests to the '/ClientArea/RuntimeInfoData.mwsl' endpoint. This endpoint exposes runtime information including current actual cycle times, configured maximum cycle times, and maximum communication load parameters. Since the endpoint is accessible without authentication, a remote attacker can retrieve this data without any credentials or user interaction. The vulnerability has a CVSS v3.1 base score of 5.3, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to confidentiality as it leaks operational parameters that could be used for reconnaissance or to tailor further attacks on industrial control systems. No integrity or availability impacts are reported. The vulnerability affects version '0' of the product, which likely refers to initial or current firmware versions. Siemens has not published patches yet, and no known exploits are observed in the wild. The vulnerability highlights the risk of exposing sensitive operational data through insufficiently protected web interfaces in industrial control systems.

Potential Impact

For European organizations, particularly those in manufacturing, energy, and critical infrastructure sectors relying on Siemens SIMATIC Drive Controller CPU 1504D TF, this vulnerability poses a confidentiality risk. Attackers can remotely gather sensitive operational data that may reveal system performance parameters and communication loads. Such information can facilitate more sophisticated attacks, including timing-based attacks, denial of service, or targeted intrusion attempts. While the vulnerability does not directly allow control or disruption of the device, the leaked data could aid attackers in mapping the industrial environment and identifying potential weaknesses. This is especially critical in Europe where industrial automation is widespread and integral to economic and infrastructure stability. The exposure of operational metrics could also violate data protection policies or regulatory requirements related to industrial cybersecurity. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits based on this information.

Mitigation Recommendations

1. Restrict network access to the SIMATIC Drive Controller web interface, especially the '/ClientArea/RuntimeInfoData.mwsl' endpoint, by implementing strict firewall rules and network segmentation to isolate industrial control systems from general IT networks and the internet. 2. Deploy intrusion detection and prevention systems (IDS/IPS) to monitor and alert on unauthorized access attempts to the vulnerable endpoint. 3. Use VPNs or secure tunnels with strong authentication for remote access to industrial devices to prevent unauthorized external access. 4. Regularly audit and review access logs for unusual or unauthorized requests to the affected endpoint. 5. Engage with Siemens support to obtain updates on patches or firmware upgrades addressing this vulnerability and plan timely deployment once available. 6. Implement compensating controls such as disabling the web server interface if not required or limiting its functionality to trusted administrators. 7. Train operational technology (OT) security teams to recognize and respond to reconnaissance activities targeting industrial control systems. 8. Maintain an up-to-date asset inventory to quickly identify affected devices and prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2024-09-12T07:44:52.468Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd66ce

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 10/21/2025, 4:30:02 PM

Last updated: 12/4/2025, 12:13:56 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats