CVE-2024-32011
Published: 11 November 2025
Summary
CVE-2024-32011 is a high-severity Inclusion of Functionality from Untrusted Control Sphere (CWE-829) vulnerability. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the vulnerability by requiring timely patching to Spectrum Power 4 V4.70 SP12 Update 2 or later as specified in Siemens advisory SSA-339694.
Validates user interface inputs over the network to block arbitrary command execution from low-privilege authenticated attackers.
Enforces least privilege on the administrative application user, limiting the impact of exploited arbitrary command execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables remote exploitation of a public-facing application (T1190) for arbitrary command execution with privilege escalation from low privileges to administrative application user (T1068).
NVD Description
A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to run arbitrary commands via the user interface. This user interface can be used via the network and allows…
more
the execution of commands as administrative application user.
Deeper analysisAI
CVE-2024-32011 is a vulnerability in Siemens Spectrum Power 4, affecting all versions prior to V4.70 SP12 Update 2. The flaw enables the execution of arbitrary commands through the application's user interface, which is accessible over the network. Commands run with the privileges of the administrative application user and is classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere), with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
An authenticated attacker with low privileges can exploit this vulnerability remotely over the network with low attack complexity and without requiring user interaction. Exploitation allows the execution of arbitrary commands as the administrative application user, granting high-impact access to confidentiality, integrity, and availability of the affected system.
Siemens has issued security advisory SSA-339694, available at https://cert-portal.siemens.com/productcert/html/ssa-339694.html, which addresses this issue. Mitigation requires updating to Spectrum Power 4 V4.70 SP12 Update 2 or later.
Details
- CWE(s)