First published: Tue Dec 12 2023(Updated: )
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The radius configuration mechanism of affected products does not correctly check uploaded certificates. A malicious admin could upload a crafted certificate resulting in a denial-of-service condition or potentially issue commands on system level.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 | |
Siemens Sinec Ins | =1.0-sp2 | |
Siemens Sinec Ins | =1.0-sp2_update_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48428 allows a malicious admin to upload a crafted certificate that could lead to a denial-of-service condition.
To mitigate CVE-2023-48428, users should ensure they are running Siemens SINEC INS version 1.0 SP2 Update 2 or later.
All versions of Siemens SINEC INS prior to 1.0 SP2 Update 2 are affected by CVE-2023-48428.
If CVE-2023-48428 is present on your system, you should update to the latest version of Siemens SINEC INS immediately.
The permanent fix for CVE-2023-48428 is to upgrade to Siemens SINEC INS version 1.0 SP2 Update 2 or higher.