First published: Tue Dec 12 2023(Updated: )
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The Web UI of affected devices does not check the length of parameters in certain conditions. This allows a malicious admin to crash the server by sending a crafted request to the server. The server will automatically restart.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEC Ins | <1.0 | |
Siemens SINEC Ins | =1.0 | |
Siemens SINEC Ins | =1.0-sp1 | |
Siemens SINEC Ins | =1.0-sp2 | |
Siemens SINEC Ins | =1.0-sp2_update_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48429 is considered a high severity vulnerability due to its ability to allow a malicious admin to crash the server.
To fix CVE-2023-48429, upgrade to SINEC INS version 1.0 SP2 Update 2 or later.
CVE-2023-48429 affects all versions of SINEC INS below version 1.0 SP2 Update 2.
CVE-2023-48429 can facilitate a denial-of-service attack by crashing the server through crafted requests.
Organizations using affected versions of SINEC INS, particularly those with administrative access, are vulnerable to CVE-2023-48429.