A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-868282.html | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/html/ssa-868282.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/html/ssa-868282.html - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.6 |
06 Sep 2024, 21:26
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:sinema_remote_connect_client:3.2:-:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
First Time |
Siemens sinema Remote Connect Client
Siemens |
|
References | () https://cert-portal.siemens.com/productcert/html/ssa-868282.html - Patch, Vendor Advisory | |
Summary |
|
09 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-09 12:15
Updated : 2024-11-21 09:28
NVD link : CVE-2024-39569
Mitre link : CVE-2024-39569
CVE.ORG link : CVE-2024-39569
JSON object : View
Products Affected
siemens
- sinema_remote_connect_client
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')