First published: Tue Jul 09 2024(Updated: )
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected devices do not properly validate the authentication when performing certain actions in the web interface allowing an unauthenticated attacker to access and edit device configuration information of devices for which they have no privileges.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEMA Remote Connect | <3.2 | |
Siemens SINEMA Remote Connect | =3.2 | |
Siemens SINEMA Remote Connect | =3.2-hf1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39867 is categorized as a high-severity vulnerability due to unauthorized access risks.
To fix CVE-2024-39867, upgrade to Siemens SINEMA Remote Connect Server version 3.2 SP1 or later.
CVE-2024-39867 affects all versions of Siemens SINEMA Remote Connect Server prior to version 3.2 SP1.
CVE-2024-39867 can be exploited by unauthenticated attackers to gain unauthorized access and edit device configuration.
Unauthenticated attackers can access and modify device configuration information through the web interface due to CVE-2024-39867.