First published: Tue Aug 13 2024(Updated: )
A vulnerability has been identified in SINEC NMS (All versions < V3.0). The affected application does not properly validate user input to a privileged command queue. This could allow an authenticated attacker to execute OS commands with elevated privileges.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEC NMS | <3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41940 is considered a high-severity vulnerability due to its potential for executing OS commands with elevated privileges.
To fix CVE-2024-41940, upgrade to SINEC NMS version 3.0 or later, which includes necessary input validation enhancements.
An authenticated attacker can exploit CVE-2024-41940 by leveraging the inadequate input validation to execute arbitrary OS commands.
All versions of SINEC NMS prior to version 3.0 are affected by CVE-2024-41940.
Yes, user authentication is required to exploit CVE-2024-41940, as it involves execution of commands through a privileged command queue.