CVE-2024-41986

A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application support insecure TLS 1.0 and 1.1 protocol. An attacker could achieve a man-in-the-middle attack and compromise confidentiality and integrity of data.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:siemens:opcenter_quality:13.2:*:*:*:*:*:*:*

History

22 Oct 2025, 18:33

Type Values Removed Values Added
Summary
  • (es) Se ha identificado una vulnerabilidad en los módulos SmartClient Opcenter QL Home (SC) (todas las versiones &gt;= V13.2 &lt; V2506), SOA Audit (todas las versiones &gt;= V13.2 &lt; V2506) y SOA Cockpit (todas las versiones &gt;= V13.2 &lt; V2506). La aplicación afectada admite el protocolo TLS 1.0 y 1.1 inseguro. Un atacante podría realizar un ataque de intermediario y comprometer la confidencialidad e integridad de los datos.
References () https://cert-portal.siemens.com/productcert/html/ssa-382999.html - () https://cert-portal.siemens.com/productcert/html/ssa-382999.html - Vendor Advisory
First Time Siemens
Siemens opcenter Quality
CPE cpe:2.3:a:siemens:opcenter_quality:13.2:*:*:*:*:*:*:*

12 Aug 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-12 12:15

Updated : 2025-10-22 18:33


NVD link : CVE-2024-41986

Mitre link : CVE-2024-41986

CVE.ORG link : CVE-2024-41986


JSON object : View

Products Affected

siemens

  • opcenter_quality
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm