First published: Tue Aug 13 2024(Updated: )
A vulnerability has been identified in SINEC NMS (All versions < V3.0). The affected application does not properly enforce authorization checks. This could allow an authenticated attacker to bypass the checks and elevate their privileges on the application.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEC NMS SP1 Update 1 | <3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41939 is rated as a high-severity vulnerability due to its potential to allow authenticated attackers to elevate privileges.
To mitigate CVE-2024-41939, it is recommended to upgrade SINEC NMS to version 3.0 or later where authorization checks are properly enforced.
The impact of CVE-2024-41939 is that it allows authenticated attackers to bypass authorization controls, leading to potential privilege escalation.
All users of SINEC NMS versions prior to 3.0 are affected by CVE-2024-41939.
Yes, CVE-2024-41939 can be exploited by authenticated attackers to gain unauthorized access.