A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate a file path that is supplied to an endpoint intended to create CSR files.
This could allow an unauthenticated remote attacker to create files in writable directories outside the intended location and thus compromise integrity of files in those writable directories.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-430425.html | Third Party Advisory |
Configurations
History
11 Oct 2024, 20:05
Type | Values Removed | Values Added |
---|---|---|
First Time |
Siemens
Siemens sinec Security Monitor |
|
CPE | cpe:2.3:a:siemens:sinec_security_monitor:*:*:*:*:*:*:*:* | |
References | () https://cert-portal.siemens.com/productcert/html/ssa-430425.html - Third Party Advisory |
10 Oct 2024, 12:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Oct 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-08 09:15
Updated : 2024-10-11 20:05
NVD link : CVE-2024-47563
Mitre link : CVE-2024-47563
CVE.ORG link : CVE-2024-47563
JSON object : View
Products Affected
siemens
- sinec_security_monitor
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')