First published: Tue Aug 13 2024(Updated: )
A vulnerability has been identified in SINEC NMS (All versions < V3.0). The importCertificate function of the SINEC NMS Control web application contains a path traversal vulnerability. This could allow an authenticated attacker it to delete arbitrary certificate files on the drive SINEC NMS is installed on.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEC NMS SP1 Update 1 | <3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41938 is considered a critical vulnerability due to its potential for remote file deletion by authenticated attackers.
To fix CVE-2024-41938, upgrade SINEC NMS to version 3.0 or later to eliminate the path traversal vulnerability.
CVE-2024-41938 allows authenticated attackers to perform a path traversal attack, enabling them to delete arbitrary certificate files.
All versions of SINEC NMS prior to version 3.0 are affected by CVE-2024-41938.
No, CVE-2024-41938 can only be exploited by authenticated users of the SINEC NMS Control web application.