PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-27903 Siemens CVE debrief

CVE-2024-27903 is a critical issue affecting Siemens SINEMA Remote Connect Client on Windows. The advisory says OpenVPN plug-ins in OpenVPN 2.6.9 and earlier could be loaded from any directory, enabling an attacker to load an arbitrary plug-in and interact with the privileged OpenVPN interactive service.

Vendor
Siemens
Product
SINEMA Remote Connect Client
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-03-11
Original CVE updated
2025-03-11
Advisory published
2025-03-11
Advisory updated
2025-03-11

Who should care

Siemens SINEMA Remote Connect Client administrators, OT/industrial remote-access teams, and security operations staff responsible for Windows endpoints that use OpenVPN-based connectivity.

Technical summary

Per the CISA CSAF advisory for Siemens SINEMA Remote Connect Client, the affected Windows OpenVPN plug-in handling allows plug-ins to be loaded from arbitrary directories in OpenVPN 2.6.9 and earlier. That creates an avenue for attacker-controlled plug-in loading and interaction with a privileged OpenVPN interactive service. The provided CVSS vector is 9.8 (network, low complexity, no privileges, no user interaction, high confidentiality/integrity/availability impact). Siemens lists an update to V3.2 SP3 or later as remediation.

Defensive priority

Immediate. This is a critical, network-exploitable issue with no privileges or user interaction required and a vendor fix is available.

Recommended defensive actions

  • Identify Windows systems running Siemens SINEMA Remote Connect Client and determine whether they are affected by the OpenVPN plug-in loading issue.
  • Upgrade to Siemens SINEMA Remote Connect Client V3.2 SP3 or later as recommended by the vendor.
  • Track Siemens and CISA advisories for this product and apply the vendor remediation as part of your standard OT/ICS patch validation process.

Evidence notes

This debrief is based on the supplied CISA CSAF advisory data for ICSA-25-072-10, published 2025-03-11, which names Siemens SINEMA Remote Connect Client as the affected product and describes the OpenVPN plug-in loading issue. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The remediation field in the source data states: update to V3.2 SP3 or later. No additional exploitation details are included beyond the source corpus.

Official resources

Public advisory data was published on 2025-03-11. This debrief reflects only the supplied source corpus and official links.