Siemens SINEMA Remote Connect Client

Act NowCVSS 9.8ICS-CERT ICSA-25-072-10Mar 11, 2025
Siemens
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

SINEMA Remote Connect Client versions before 3.2 SP3 contain multiple vulnerabilities (CWE-190 integer overflow, CWE-420 uninitialized pointer, CWE-923 improper variable use, CWE-121 stack-based buffer overflow, CWE-434 unrestricted file upload, CWE-772 resource leak) that allow remote code execution without authentication. Siemens recommends updating to version 3.2 SP3 or later.

What this means
What could happen
An attacker with network access could execute arbitrary code on systems running SINEMA Remote Connect Client, potentially compromising the integrity of remote connections to industrial control systems and enabling unauthorized access to critical infrastructure.
Who's at risk
Organizations using Siemens SINEMA Remote Connect Client for secure remote access to industrial systems should prioritize this update. This affects utilities, manufacturing plants, and other critical infrastructure operators who rely on this tool for engineering and maintenance access to PLCs, RTUs, and SCADA systems.
How it could be exploited
An attacker with network reachability to a device running SINEMA Remote Connect Client (before V3.2 SP3) can exploit one or more of the underlying vulnerabilities (CWE-190, CWE-420, CWE-923, CWE-121, CWE-434, CWE-772) to achieve remote code execution without authentication. The attacker could then run commands with the privileges of the connected user or service account.
Prerequisites
  • Network access to the SINEMA Remote Connect Client installation
  • No authentication required
remotely exploitableno authentication requiredlow complexityhigh EPSS score (11.1%)affects remote access to critical systems
Exploitability
Likely to be exploited — EPSS score 11.1%
Affected products (1)
ProductAffected VersionsFix Status
SINEMA Remote Connect Client<V3.2 SP33.2 SP3
Remediation & Mitigation
0/4
Do now
0/1
WORKAROUNDRestrict network access to SINEMA Remote Connect Client systems using firewall rules
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate SINEMA Remote Connect Client to version 3.2 SP3 or later
Long-term hardening
0/2
HARDENINGIsolate remote access systems from production OT networks using network segmentation or DMZ
HARDENINGWhen remote access to industrial control systems is required, use VPNs with current security updates and require additional authentication layers
API: /api/v1/advisories/423df806-d9b5-4cb0-9e05-fa31d8b8949e

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.