First published: Tue Oct 12 2021(Updated: )
A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). The affected system allows to upload JSON objects that are deserialized to JAVA objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a crafted serialized Java object. An exploit could allow the attacker to execute arbitrary code on the device with root privileges.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEC NMS | <1.0 | |
Siemens SINEC NMS | =1.0 | |
Siemens SINEC NMS | =1.0-sp1 | |
Siemens SINEC NMS | =1.0-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-33728 is critical with a CVSS score of 7.2.
All versions of Siemens SINEC NMS prior to V1.0 SP2 Update 1 are affected by CVE-2021-33728.
CVE-2021-33728 is a vulnerability in SINEC NMS that allows a privileged attacker to exploit insecure deserialization of user-supplied content, potentially leading to remote code execution.
An attacker can exploit CVE-2021-33728 by uploading malicious JSON objects that are deserialized to JAVA objects, allowing them to execute arbitrary code.
Siemens has released an update (V1.0 SP2 Update 1) to address the vulnerability in SINEC NMS. It is recommended to update to the latest version to mitigate the risk.