First published: Tue Nov 12 2024(Updated: )
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly validate input sent to specific endpoints of its web API. This could allow an authenticated remote attacker with high privileges on the application to execute arbitrary code on the underlying OS.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 | |
Siemens Sinec Ins | =1.0-sp2 | |
Siemens Sinec Ins | =1.0-sp2_update_1 | |
Siemens Sinec Ins | =1.0-sp2_update_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46890 is categorized as a critical vulnerability due to the potential for arbitrary code execution by authenticated attackers.
To fix CVE-2024-46890, upgrade your SINEC INS application to version 1.0 SP2 Update 3 or later.
CVE-2024-46890 affects all versions of SINEC INS prior to V1.0 SP2 Update 3.
An authenticated remote attacker can exploit CVE-2024-46890 to execute arbitrary code on the affected application.
The impact of CVE-2024-46890 includes potential system compromise and unauthorized access to sensitive information.