Siemens patches multiple critical flaws in User Management Component of multiple products
Take action: If you're using any Siemens industrial software (Opcenter, SIMATIC PCS neo, SINEC NMS, SINEMA Remote Connect, or TIA Portal), make sure it's isolated from the internet and accessible only from trusted networks. Then plan a quick update update to the latest patched versions, since the User Management Component can be hacked or crashed quite easily. Until you can patch, block or restrict access to TCP ports 4002 and 4004 to only trusted systems within your UMC network.
Learn More
Siemens has released security advisories patching multiple vulnerabilities in its User Management Component (UMC), a component integrated into its industrial automation and management products. These vulnerabilities potentially allow unauthenticated remote attackers to execute arbitrary code or cause denial of service.
Vulnerabilities summary
- CVE-2024-33698 (CVSS score 9.8), is a heap-based buffer overflow vulnerability that could allow an unauthenticated remote attacker to execute arbitrary code on affected systems.
- CVE-2025-40795 (CVSS score 9.8), a stack-based buffer overflow vulnerability that could similarly allow unauthenticated remote attackers to execute arbitrary code or cause denial of service conditions.
- CVE-2025-40796 (CVSS score 7.5), out-of-bounds read vulnerability, allows unauthenticated remote attackers to cause denial of service conditions on affected systems.
- CVE-2025-40797 (CVSS score 7.5), out-of-bounds read vulnerability, allows unauthenticated remote attackers to cause denial of service conditions on affected systems.
- CVE-2025-40798 (CVSS score 7.5), out-of-bounds read vulnerability, allows unauthenticated remote attackers to cause denial of service conditions on affected systems.
Affected products include
- Opcenter Quality (all versions prior to V2406), update to V2406 or later;
- Opcenter RDnL (all versions prior to V2410), update to V2410 or later;
- SIMATIC PCS neo,
- SINEC NMS (all versions), update UMC to V2.15.1.1 or later compatible versions
- SINEMA Remote Connect Client (all versions prior to V3.2 SP3), update to V3.2 SP3 or later
- Totally Integrated Automation Portal (TIA Portal).
- Standalone User Management Component is affected in all versions prior to V2.15.1.3, update to V2.15.1.3 or later
Organizations that can't upgrade to patched versions should filtering ports 4002 and 4004 to only accept connections from IP addresses of machines running UMC that are part of the UMC network. If RT server machines are not being used in the deployment, port 4004 can be blocked completely. In non-networked scenarios or deployments, administrators should block TCP ports 4002 and 4004 on machines with UMC installed.