First published: Tue Oct 12 2021(Updated: )
A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the webserver of the affected application.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEC NMS | <1.0 | |
Siemens SINEC NMS | =1.0 | |
Siemens SINEC NMS | =1.0-sp1 | |
Siemens SINEC NMS | =1.0-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-33730 is high with a severity value of 7.2.
CVE-2021-33730 affects Siemens SINEC NMS versions < V1.0 SP2 Update 1.
A privileged authenticated attacker can execute arbitrary commands in the local database by sending crafted requests to the webserver of the affected application.
Yes, upgrading to V1.0 SP2 Update 1 or later versions of Siemens SINEC NMS fixes the vulnerability.
You can find more information about CVE-2021-33730 in the official Siemens ProductCERT advisory available at [PDF Link](https://cert-portal.siemens.com/productcert/pdf/ssa-163251.pdf).