First published: Tue Aug 13 2024(Updated: )
A vulnerability has been identified in Location Intelligence family (All versions < V4.4). The web server of affected products is configured to support weak ciphers by default. This could allow an unauthenticated attacker in an on-path position to to read and modify any data passed over the connection between legitimate clients and the affected device.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Location Intelligence | <4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41681 has been categorized as a high-severity vulnerability due to its potential impact on data integrity and confidentiality.
To fix CVE-2024-41681, upgrade your Siemens Location Intelligence software to version 4.4 or later which removes support for weak ciphers.
CVE-2024-41681 affects all versions of Siemens Location Intelligence software prior to version 4.4.
The risks of CVE-2024-41681 include unauthorized data exposure and manipulation by attackers in an on-path position.
Yes, CVE-2024-41681 is classified as an unauthenticated vulnerability, allowing attackers to exploit it without prior authentication.