First published: Tue Jul 09 2024(Updated: )
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application does not properly assign rights to temporary files created during its update process. This could allow an authenticated attacker with the 'Manage firmware updates' role to escalate their privileges on the underlying OS level.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEMA Remote Connect | <3.2 | |
Siemens SINEMA Remote Connect | =3.2 | |
Siemens SINEMA Remote Connect | =3.2-hf1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39872 is classified as a high-severity vulnerability due to the potential for authenticated attackers to escalate privileges.
To remediate CVE-2024-39872, upgrade the SINEMA Remote Connect Server to version 3.2 SP1 or later.
CVE-2024-39872 affects all versions of SINEMA Remote Connect Server prior to version 3.2 SP1.
The impact of CVE-2024-39872 allows an authenticated attacker with the 'Manage firmware updates' role to escalate privileges.
Currently, there are no published workarounds for CVE-2024-39872, so applying the update is recommended.