First published: Tue Dec 12 2023(Updated: )
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The REST API of affected devices does not check the length of parameters in certain conditions. This allows a malicious admin to crash the server by sending a crafted request to the API. The server will automatically restart.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 | |
Siemens Sinec Ins | =1.0-sp2 | |
Siemens Sinec Ins | =1.0-sp2_update_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-48430 is rated as low with a CVSS score of 2.7.
A malicious admin can crash the server by sending a crafted request to the API of affected devices.
Yes, Siemens SINEC INS version 1.0 SP2 Update 2 is affected by the vulnerability.