First published: Tue Aug 13 2024(Updated: )
A vulnerability has been identified in SINEC NMS (All versions < V3.0). The affected application does not properly enforce authorization checks. This could allow an authenticated attacker to bypass the checks and modify settings in the application without authorization.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEC NMS SP1 Update 1 | <3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41941 is classified as a medium severity vulnerability due to its potential for unauthorized modification of application settings.
To fix CVE-2024-41941, update SINEC NMS to version 3.0 or later, which includes proper enforcement of authorization checks.
The risks associated with CVE-2024-41941 include unauthorized access and modification of application settings by authenticated attackers.
CVE-2024-41941 affects all versions of SINEC NMS prior to version 3.0.
CVE-2024-41941 requires authentication, thus it cannot be exploited remotely without valid user credentials.