A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected applications do not properly separate the rights to edit device settings and to edit settings for communication relations. This could allow an authenticated attacker with the permission to manage devices to gain access to participant groups that the attacked does not belong to.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-381581.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
06 Sep 2024, 18:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:hf1:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:-:*:*:*:*:*:* |
|
Summary |
|
|
First Time |
Siemens
Siemens sinema Remote Connect Server |
|
References | () https://cert-portal.siemens.com/productcert/html/ssa-381581.html - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
09 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-09 12:15
Updated : 2024-09-06 18:32
NVD link : CVE-2024-39871
Mitre link : CVE-2024-39871
CVE.ORG link : CVE-2024-39871
JSON object : View
Products Affected
siemens
- sinema_remote_connect_server
CWE
CWE-863
Incorrect Authorization