First published: Tue Sep 10 2024(Updated: )
A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 SP2). The affected application does not expire the user session on reboot without logout. This could allow an attacker to bypass Multi-Factor Authentication.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEMA Remote Connect | <3.2 SP2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32006 has been classified as a medium-severity vulnerability due to the potential risk it poses to user authentication.
To mitigate CVE-2024-32006, update your SINEMA Remote Connect Client to version 3.2 SP2 or later.
CVE-2024-32006 can potentially allow attackers to bypass Multi-Factor Authentication if the user session is not properly expired.
CVE-2024-32006 affects all versions of SINEMA Remote Connect Client prior to 3.2 SP2.
Yes, users must actively update to the latest version of SINEMA Remote Connect Client to protect against CVE-2024-32006.