First published: Tue Nov 12 2024(Updated: )
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly restrict the size of generated log files. This could allow an unauthenticated remote attacker to trigger a large amount of logged events to exhaust the system's resources and create a denial of service condition.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEC Ins | <V1.0 SP2 Update 3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46891 is classified as a high severity vulnerability due to its potential to allow resource exhaustion through excessive log file generation.
To fix CVE-2024-46891, upgrade the SINEC INS application to version 1.0 SP2 Update 3 or later.
CVE-2024-46891 affects all versions of SINEC INS that are earlier than version 1.0 SP2 Update 3.
The potential impacts of CVE-2024-46891 include system resource exhaustion and denial of service due to uncontrolled log file growth.
No, CVE-2024-46891 can be exploited by an unauthenticated remote attacker.