First published: Tue Aug 13 2024(Updated: )
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V2.0). The affected application mounts the container's root filesystem with read and write privileges. This could allow an attacker to alter the container's filesystem leading to unauthorized modifications and data corruption.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinec Traffic Analyzer | <2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41903 is considered a high-severity vulnerability due to its potential for unauthorized access and modification of the container's filesystem.
To mitigate CVE-2024-41903, upgrade SINEC Traffic Analyzer to version 2.0 or later, where the container's root filesystem is not mounted with read and write privileges.
CVE-2024-41903 affects all versions of SINEC Traffic Analyzer prior to version 2.0.
An attacker could exploit CVE-2024-41903 to alter the container's filesystem, leading to unauthorized modifications and potential data integrity issues.
If upgrading is not possible, consider restricting access to the SINEC Traffic Analyzer environment to limit exposure to CVE-2024-41903.