First published: Tue Jul 09 2024(Updated: )
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application allows users to upload encrypted backup files. This could allow an attacker with access to the backup encryption key and with the right to upload backup files to create a user with administrative privileges.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEMA Remote Connect | <3.2 | |
Siemens SINEMA Remote Connect | =3.2 | |
Siemens SINEMA Remote Connect | =3.2-hf1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39866 is considered a high severity vulnerability due to its potential to allow unauthorized user creation through uploaded backup files.
To mitigate CVE-2024-39866, upgrade to SINEMA Remote Connect Server version 3.2 SP1 or later.
CVE-2024-39866 affects all versions of SINEMA Remote Connect Server prior to 3.2 SP1.
CVE-2024-39866 allows an attacker with access to the backup encryption key to create unauthorized users by uploading manipulated backup files.
There are no official workarounds for CVE-2024-39866; upgrading to a patched version is recommended.