First published: Tue Oct 08 2024(Updated: )
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly validate a file path that is supplied to an endpoint intended to create CSR files. This could allow an unauthenticated remote attacker to create files in writable directories outside the intended location and thus compromise integrity of files in those writable directories.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEC Security Monitor | <4.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47563 is considered a critical vulnerability due to its potential for unauthenticated remote exploitation.
To mitigate CVE-2024-47563, upgrade Siemens SINEC Security Monitor to version 4.9.0 or higher.
All versions of Siemens SINEC Security Monitor prior to version 4.9.0 are affected by CVE-2024-47563.
Yes, CVE-2024-47563 can be exploited by unauthenticated remote attackers.
CVE-2024-47563 allows attackers to create files in writable directories due to improper file path validation.