CVE-2024-39569

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinema_remote_connect_client:3.2:-:*:*:*:*:*:*

History

06 Sep 2024, 21:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CPE cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinema_remote_connect_client:3.2:-:*:*:*:*:*:*
References () https://cert-portal.siemens.com/productcert/html/ssa-868282.html - () https://cert-portal.siemens.com/productcert/html/ssa-868282.html - Patch, Vendor Advisory
First Time Siemens
Siemens sinema Remote Connect Client

09 Jul 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-09 12:15

Updated : 2024-09-06 21:26


NVD link : CVE-2024-39569

Mitre link : CVE-2024-39569


JSON object : View

Products Affected

siemens

  • sinema_remote_connect_client
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')