Home

Description

A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application support insecure TLS 1.0 and 1.1 protocol. An attacker could achieve a man-in-the-middle attack and compromise confidentiality and integrity of data.

PUBLISHED Reserved 2024-07-25 | Published 2025-08-12 | Updated 2025-08-12 | Assigner siemens




MEDIUM: 6.4CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L
MEDIUM: 6.1CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-327: Use of a Broken or Risky Cryptographic Algorithm

Product status

Default status
unknown

V13.2 before V2506
affected

Default status
unknown

V13.2 before V2506
affected

Default status
unknown

V13.2 before V2506
affected

References

cert-portal.siemens.com/productcert/html/ssa-382999.html

cve.org (CVE-2024-41986)

nvd.nist.gov (CVE-2024-41986)

Download JSON