A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-868282.html | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/html/ssa-868282.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-07-09 12:15
Updated : 2024-11-21 09:28
NVD link : CVE-2024-39569
Mitre link : CVE-2024-39569
CVE.ORG link : CVE-2024-39569
JSON object : View
Products Affected
siemens
- sinema_remote_connect_client
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')