First published: Tue Jun 11 2024(Updated: )
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server is allowing HTTP methods like PUT and Delete. This could allow an attacker to modify unauthorized files.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinec Traffic Analyzer | <1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35209 is classified as a high severity vulnerability due to the potential for unauthorized file modification.
To mitigate CVE-2024-35209, update your SINEC Traffic Analyzer to version 1.2 or later where the vulnerable HTTP methods are no longer permitted.
All versions of SINEC Traffic Analyzer prior to version 1.2 are affected by CVE-2024-35209.
An attacker could exploit CVE-2024-35209 to modify or delete unauthorized files on the SINEC Traffic Analyzer web server.
For more information on CVE-2024-35209, refer to the official security advisory from Siemens.