A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected applications do not properly handle log rotation. This could allow an unauthenticated remote attacker to cause a denial of service condition through resource exhaustion on the device.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-381581.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Aug 2024, 19:26
Type | Values Removed | Values Added |
---|---|---|
First Time |
Siemens sinema Remote Connect Server
Siemens |
|
CPE | cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:-:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:* |
|
Summary |
|
|
References | () https://cert-portal.siemens.com/productcert/html/ssa-381581.html - Vendor Advisory |
09 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-09 12:15
Updated : 2024-08-07 19:26
NVD link : CVE-2024-39876
Mitre link : CVE-2024-39876
CVE.ORG link : CVE-2024-39876
JSON object : View
Products Affected
siemens
- sinema_remote_connect_server
CWE
CWE-770
Allocation of Resources Without Limits or Throttling