PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-51444 Siemens CVE debrief

CVE-2024-51444 is a medium-severity SQL injection issue in Siemens Polarion V2310 and V2404, publicly disclosed on 2025-05-13. The advisory states that insufficient validation of user input for database read queries could let an authenticated remote attacker bypass authorization controls and download data from the application's database. Siemens lists no fix planned for Polarion V2310 and recommends updating Polarion V2404 to V2404.4 or later.

Vendor
Siemens
Product
Polarion V2310
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-05-13
Original CVE updated
2025-05-13
Advisory published
2025-05-13
Advisory updated
2025-05-13

Who should care

Administrators and operators of Siemens Polarion V2310 or V2404, application security teams, and defenders responsible for protecting authenticated business or engineering data in Polarion deployments.

Technical summary

The source advisory describes an SQL injection condition in database read queries caused by insufficient input validation. An attacker needs authenticated remote access, but no user interaction is required. Successful exploitation can expose database contents and is rated CVSS 3.1 6.5/Medium with a confidentiality impact only (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).

Defensive priority

Prioritize remediation for any Polarion deployment that stores sensitive records, because the issue can expose application database data through an authenticated path and bypass authorization controls. Upgrade Polarion V2404 to V2404.4 or later; for V2310, plan compensating controls and engage Siemens for supported mitigation or lifecycle guidance because no fix is planned.

Recommended defensive actions

  • Upgrade Siemens Polarion V2404 to V2404.4 or later as directed by the vendor.
  • For Polarion V2310, treat the issue as unresolved because the advisory states no fix is planned; apply compensating controls and contact Siemens for mitigation guidance.
  • Review authenticated access paths and authorization rules around database-backed read functions to reduce exposure of sensitive records.
  • Monitor application and database logs for unusual query patterns or unexpected data-access activity involving Polarion users.
  • Apply CISA and Siemens defense-in-depth guidance for industrial software environments, including least privilege and segmentation where appropriate.

Evidence notes

All material facts in this debrief come from the supplied CISA CSAF advisory for ICSA-25-135-11, the linked Siemens advisory references, and the provided CVE metadata. The source corpus identifies Siemens Polarion V2310 and V2404 as affected products, describes insufficient validation of user input for database read queries, notes that an authenticated remote attacker could bypass authorization controls and download database data, and lists remediation of V2404.4 or later for V2404 with no fix planned for V2310. The supplied timeline shows publication and modification on 2025-05-13, which is used here as the disclosure date.

Official resources

Publicly disclosed on 2025-05-13 through CISA ICS Advisory ICSA-25-135-11 and the linked Siemens advisory materials.