PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-38081 Siemens CVE debrief

CVE-2024-38081 is a HIGH-severity elevation-of-privilege issue in Siemens INTRALOG WMS per the supplied CISA CSAF record. The advisory rates the issue 7.3 and indicates a local attack path that requires low privileges and user interaction, but can still impact confidentiality, integrity, and availability. Siemens' documented remediation is to update affected systems to V5 or later.

Vendor
Siemens
Product
INTRALOG WMS
CVSS
HIGH 7.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-05-13
Original CVE updated
2025-05-13
Advisory published
2025-05-13
Advisory updated
2025-05-13

Who should care

Administrators and operators of Siemens INTRALOG WMS, OT/ICS security teams, vulnerability management teams, and any support staff responsible for deploying Siemens updates in production environments.

Technical summary

The supplied advisory maps CVE-2024-38081 to Siemens INTRALOG WMS and classifies it as CVSS 3.1 AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H. In practical terms, an attacker would need local access, low privileges, and some user interaction, but successful exploitation could result in privilege escalation with high impact to confidentiality, integrity, and availability. The vendor remediation listed in the source is to update to V5 or later.

Defensive priority

High priority. This is a local privilege-escalation issue with user interaction required and a vendor fix available; prioritize patching Siemens INTRALOG WMS deployments identified as affected.

Recommended defensive actions

  • Inventory Siemens INTRALOG WMS installations and confirm whether they are within the affected scope described by the advisory.
  • Apply Siemens' remediation by updating to V5 or later on affected systems.
  • Validate the update in maintenance windows and confirm the deployed version after remediation.
  • Restrict local access and review user permissions on systems running the product until patching is complete.
  • Monitor affected hosts for unusual privilege changes or suspicious local activity.
  • Track the official Siemens and CISA advisories for any follow-up guidance or revision history.

Evidence notes

This debrief relies on the supplied CISA CSAF source record (ICSA-25-135-02) and its linked Siemens advisories. The provided corpus contains a metadata mismatch: the generic CVE description references .NET/.NET Framework/Visual Studio, while the source advisory maps CVE-2024-38081 to Siemens INTRALOG WMS. Because only the supplied corpus and official links are allowed, this summary follows the Siemens/CISA source mapping and remediation as written in the advisory.

Official resources

Publicly disclosed in the supplied CISA CSAF advisory on 2025-05-13. The provided enrichment does not indicate a KEV listing.