First published: Tue Oct 12 2021(Updated: )
A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). The affected system has a Path Traversal vulnerability when exporting a firmware container. With this a privileged authenticated attacker could create arbitrary files on an affected system.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEC NMS | <1.0 | |
Siemens SINEC NMS | =1.0 | |
Siemens SINEC NMS | =1.0-sp1 | |
Siemens SINEC NMS | =1.0-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-33722.
The affected software is Siemens SINEC NMS, all versions prior to V1.0 SP2 Update 1.
CVE-2021-33722 has a severity level of 4.9, which is considered medium.
CVE-2021-33722 exploits a path traversal vulnerability when exporting a firmware container in SINEC NMS, allowing a privileged authenticated attacker to create arbitrary files on the affected system.
To fix CVE-2021-33722, it is recommended to update the affected Siemens SINEC NMS software to V1.0 SP2 Update 1 or later, as specified in the Siemens security advisory.