First published: Tue Dec 12 2023(Updated: )
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). Affected software does not correctly validate the response received by an UMC server. An attacker can use this to crash the affected software by providing and configuring a malicious UMC server or by manipulating the traffic from a legitimate UMC server (i.e. leveraging CVE-2023-48427).
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 | |
Siemens Sinec Ins | =1.0-sp2 | |
Siemens Sinec Ins | =1.0-sp2_update_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-48431 is high with a score of 8.6.
An attacker can exploit CVE-2023-48431 by crashing the affected software using a malicious UMC server or by manipulating the response received by the UMC server.
Siemens SINEC INS versions up to V1.0 SP2 Update 2 are affected by CVE-2023-48431.