Home

Description

A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application does not expire the session without logout. This could allow an attacker to get unauthorized access if the session is left idle.

PUBLISHED Reserved 2024-07-25 | Published 2025-08-12 | Updated 2025-08-12 | Assigner siemens




LOW: 2.6CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
LOW: 2.1CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-613: Insufficient Session Expiration

Product status

Default status
unknown

V13.2 before V2506
affected

Default status
unknown

V13.2 before V2506
affected

Default status
unknown

V13.2 before V2506
affected

References

cert-portal.siemens.com/productcert/html/ssa-382999.html

cve.org (CVE-2024-41985)

nvd.nist.gov (CVE-2024-41985)

Download JSON