PatchSiren cyber security CVE debrief
CVE-2024-28882 Siemens CVE debrief
CVE-2024-28882 is a medium-severity issue published by CISA on 2025-03-11 for Siemens SINEMA Remote Connect Client. The advisory text states that OpenVPN versions 2.6.0 through 2.6.10, when used in a server role, can accept multiple exit notifications from authenticated clients and extend the validity of a closing session. Siemens lists an update to V3.2 SP3 or later as the remediation.
- Vendor
- Siemens
- Product
- SINEMA Remote Connect Server
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-03-11
- Original CVE updated
- 2025-03-11
- Advisory published
- 2025-03-11
- Advisory updated
- 2025-03-11
Who should care
Administrators and security teams responsible for Siemens SINEMA Remote Connect Client deployments, and operators of OpenVPN server deployments running versions 2.6.0 through 2.6.10.
Technical summary
The supplied advisory describes a condition where an authenticated client can send multiple exit notifications to an OpenVPN server, causing a closing session to remain valid longer than intended. The supplied CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) indicates network reachability, low attack complexity, required privileges, and a primary integrity impact.
Defensive priority
Medium
Recommended defensive actions
- Update Siemens SINEMA Remote Connect Client to V3.2 SP3 or later, as specified in the advisory.
- Inventory deployments to identify any OpenVPN 2.6.0 through 2.6.10 instances operating in a server role.
- Prioritize remediation for remotely accessible systems and environments where authenticated client access is broadly available.
- Review session-termination and access-control monitoring around VPN services for unexpected repeated exit notifications or abnormal session closure behavior.
- Use the CISA ICS recommended practices referenced in the advisory to reinforce segmentation, access control, and defense-in-depth around remote connectivity services.
Evidence notes
All core facts are taken from the supplied CISA CSAF advisory and its referenced Siemens material: the affected product is Siemens SINEMA Remote Connect Client; the vulnerability description names OpenVPN 2.6.0 through 2.6.10 in server role; remediation is V3.2 SP3 or later; published and modified dates are 2025-03-11. The supplied enrichment does not include KEV listing information.
Official resources
-
CVE-2024-28882 CVE record
CVE.org
-
CVE-2024-28882 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in CISA ICS Advisory ICSA-25-072-10 on 2025-03-11. No KEV listing is present in the supplied data.