SB2025111259 - Multiple vulnerabilities in Siemens Spectrum Power 



SB2025111259 - Multiple vulnerabilities in Siemens Spectrum Power

Published: November 12, 2025

Security Bulletin ID SB2025111259
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 20% Low 80%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Incorrect Use of Privileged APIs (CVE-ID: CVE-2024-32008)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an exposed debug interface on the localhost. A local user can execute arbitrary code with elevated privileges on the target system.


2) Incorrect Privilege Assignment (CVE-ID: CVE-2024-32009)

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to wrongly set permissions to a binary. A local user can gain elevated privileges on the target system.


3) Incorrect permission assignment for critical resource (CVE-ID: CVE-2024-32010)

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to incorrect permission assignment for critical resource. A local user can connect to the database and run system commands via the database.


4) Inclusion of Functionality from Untrusted Control Sphere (CVE-ID: CVE-2024-32011)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to inclusion of functionality from untrusted control sphere in the git functionality. A remote user can execute arbitrary commands on the system.


5) Incorrect permission assignment for critical resource (CVE-ID: CVE-2024-32014)

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to incorrect permission assignment for critical resource. A local attacker can gain administrative application privileges.


Remediation

Install update from vendor's website.