Lucene search

K
vulnrichmentSiemensVULNRICHMENT:CVE-2024-39569
HistoryJul 09, 2024 - 12:05 p.m.

CVE-2024-39569

2024-07-0912:05:14
CWE-77
siemens
github.com
5
vulnerability
sinema remote connect
command injection
vpn configurations
remote attacker
arbitrary code
system privileges

CVSS3

6.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

CVSS4

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

8.4

Confidence

Low

EPSS

0.001

Percentile

18.7%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.

CNA Affected

[
  {
    "vendor": "Siemens",
    "product": "SINEMA Remote Connect Client",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "V3.2 HF1",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*"
    ],
    "vendor": "siemens",
    "product": "sinema_remote_connect_client",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "v3.2hf1",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

CVSS4

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

8.4

Confidence

Low

EPSS

0.001

Percentile

18.7%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-39569