First published: Tue Sep 10 2024(Updated: )
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP2). The affected application does not properly handle user session establishment and invalidation. This could allow a remote attacker to circumvent the additional multi factor authentication for user session establishment.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEMA Remote Connect | <3.2 | |
Siemens SINEMA Remote Connect | =3.2 | |
Siemens SINEMA Remote Connect | =3.2-hf1 | |
Siemens SINEMA Remote Connect | =3.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42345 is classified as a critical severity vulnerability due to its potential to allow remote attackers to bypass multi-factor authentication.
To fix CVE-2024-42345, upgrade to SINEMA Remote Connect Server version 3.2 SP2 or later.
CVE-2024-42345 affects all versions of SINEMA Remote Connect Server prior to version 3.2 SP2.
CVE-2024-42345 enables remote attackers to circumvent multi-factor authentication during user session establishment.
There are no known workarounds for CVE-2024-42345; applying the available patch is the recommended solution.