Feb. 13, 2024, midnight |

Siemens ProductCERT Security Advisories cert-portal.siemens.com

Polarion ALM is affected by incorrect default path permissions in installation path, and improper authentication in the REST API endpoints of DOORS connector. An attacker could exploit the vulnerabilities for unauthenticated access, or privilege escalation.


Siemens is preparing fix versions and recommends countermeasures for products where fixes are not, or not yet available.

access api api endpoints attacker authentication connector countermeasures default endpoints escalation exploit fix fixes installation path permissions privilege privilege escalation products rest rest api siemens ssa unauthenticated vulnerabilities

More from cert-portal.siemens.com / Siemens ProductCERT Security Advisories

Information Security Cyber Risk Analyst

@ Intel | USA - AZ - Chandler

Senior Cloud Security Engineer (Fullstack)

@ Grab | Petaling Jaya, Malaysia

Principal Product Security Engineer

@ Oracle | United States

Cybersecurity Strategy Director

@ Proofpoint | Sunnyvale, CA

Information Security Consultant/Auditor

@ Devoteam | Lisboa, Portugal

IT Security Engineer til Netcompany IT Services

@ Netcompany | Copenhagen, Denmark