CVE-2024-39567

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an authenticated local attacker to execute arbitrary code with system privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinema_remote_connect_client:3.2:-:*:*:*:*:*:*

History

21 Aug 2025, 00:54

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/html/ssa-868282.html - () https://cert-portal.siemens.com/productcert/html/ssa-868282.html - Vendor Advisory
CPE cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinema_remote_connect_client:3.2:-:*:*:*:*:*:*
First Time Siemens
Siemens sinema Remote Connect Client

Information

Published : 2024-07-09 12:15

Updated : 2025-08-21 00:54


NVD link : CVE-2024-39567

Mitre link : CVE-2024-39567

CVE.ORG link : CVE-2024-39567


JSON object : View

Products Affected

siemens

  • sinema_remote_connect_client
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')