First published: Tue Jul 09 2024(Updated: )
A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEMA Remote Connect | <3.2 | |
Siemens SINEMA Remote Connect | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39569 is considered a critical vulnerability due to its potential for remote command injection.
To mitigate CVE-2024-39569, upgrade to SINEMA Remote Connect Client version 3.2 HF1 or later.
CVE-2024-39569 affects all versions of Siemens SINEMA Remote Connect Client prior to 3.2 HF1.
An attacker could exploit CVE-2024-39569 to execute arbitrary commands on the affected system remotely.
As of now, there are no publicly available exploits for CVE-2024-39569, but the vulnerability should be monitored closely.