PatchSiren cyber security CVE debrief
CVE-2024-23815 Siemens CVE debrief
CVE-2024-23815 affects Siemens Desigo CC. The advisory states that the server application fails to authenticate specific client requests, and that a modified client binary could let an unauthenticated remote attacker execute arbitrary SQL queries against the server database over the event port (default 4998/tcp). In environments where Installed Client access is limited to highly protected zones, the vendor notes exploitation also depends on gaining access to an Installed Client in that zone and bypassing Desigo CC hardening guidance.
- Vendor
- Siemens
- Product
- Desigo CC
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-05-13
- Original CVE updated
- 2025-05-13
- Advisory published
- 2025-05-13
- Advisory updated
- 2025-05-13
Who should care
OT/ICS defenders and administrators running Siemens Desigo CC, especially teams responsible for network segmentation, the event port, and Installed Client deployment.
Technical summary
This issue is an authentication failure on the server side for specific client requests. Per the advisory, it can be abused through the event port to issue arbitrary SQL queries against the backend database. Exposure is highest where the event port is reachable from untrusted networks or where Installed Client hardening and zone restrictions are not enforced.
Defensive priority
High for any exposed Desigo CC deployment; lower only where access is tightly segmented and Installed Client support is disabled per vendor guidance.
Recommended defensive actions
- Restrict access to the server's event port (default: 4998/tcp) to trusted systems only.
- On the Desigo CC server, disable support for Installed Clients.
- Verify that access from Installed Clients is limited to highly protected zones and that the vendor hardening guidance is enforced.
- Review and apply Siemens cybersecurity guidance and CISA ICS recommended practices for defense-in-depth and segmentation.
- Inventory Desigo CC deployments to confirm whether the event port is exposed outside the intended OT trust boundary.
Evidence notes
Source corpus is the CISA CSAF advisory ICSA-25-135-04 (published 2025-05-13) and Siemens advisory SSA-523418. The corpus explicitly states the authentication failure, the default event port 4998/tcp, the mitigations to restrict port access and disable Installed Client support, and the added zone/hardening caveat. No affected version range, fixed release, or KEV entry is supplied in the corpus.
Official resources
-
CVE-2024-23815 CVE record
CVE.org
-
CVE-2024-23815 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed on 2025-05-13 in CISA advisory ICSA-25-135-04, with Siemens advisory SSA-523418 as the vendor reference.