First published: Tue Jun 11 2024(Updated: )
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery(CSRF) attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinec Traffic Analyzer | <1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35207 is classified as a medium severity vulnerability due to the risk of Cross-Site Request Forgery (CSRF) attacks affecting the web interface.
To mitigate CVE-2024-35207, ensure you update to Siemens Sinec Traffic Analyzer version 1.2 or later to secure the web interface from CSRF vulnerabilities.
Exploitation of CVE-2024-35207 may allow unauthorized actions to be performed on behalf of an authenticated user, potentially compromising the device's integrity.
All versions of SINEC Traffic Analyzer prior to version 1.2 are affected by CVE-2024-35207.
The vendor for CVE-2024-35207 is Siemens, which develops the SINEC Traffic Analyzer software.