Lucene search

K
cveSiemensCVE-2024-39569
HistoryJul 09, 2024 - 12:15 p.m.

CVE-2024-39569

2024-07-0912:15:16
CWE-77
siemens
web.nvd.nist.gov
23
vulnerability
sinema remote connect client
remote attacker
arbitrary code
system privileges
command injection

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS4

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

8.2

Confidence

Low

EPSS

0.001

Percentile

18.7%

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.

Affected configurations

Nvd
Node
siemenssinema_remote_connect_clientRange<3.2
OR
siemenssinema_remote_connect_clientMatch3.2-
VendorProductVersionCPE
siemenssinema_remote_connect_client*cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
siemenssinema_remote_connect_client3.2cpe:2.3:a:siemens:sinema_remote_connect_client:3.2:-:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Siemens",
    "product": "SINEMA Remote Connect Client",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "V3.2 HF1",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS4

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

8.2

Confidence

Low

EPSS

0.001

Percentile

18.7%

Related for CVE-2024-39569