First published: Tue Jul 09 2024(Updated: )
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected applications can be configured to allow users to manage own users. A local authenticated user with this privilege could use this modify users outside of their own scope as well as to escalate privileges.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEMA Remote Connect | <3.2 | |
Siemens SINEMA Remote Connect | =3.2 | |
Siemens SINEMA Remote Connect | =3.2-hf1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39870 is classified as a high-severity vulnerability due to its potential for user privilege escalation.
To remediate CVE-2024-39870, upgrade your SINEMA Remote Connect Server to version 3.2 SP1 or later.
CVE-2024-39870 affects all versions of SINEMA Remote Connect Server prior to version 3.2 SP1.
A local authenticated user with permissions to manage users can exploit CVE-2024-39870 to modify users outside their scope.
Currently, there are no official workarounds for CVE-2024-39870; the best course of action is to update to a fixed version.