This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens SINEC NMS. Authentication is required to exploit this vulnerability. The specific flaw exists within the FirmwareFileUtils class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEC NMS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-21-253 is high due to the potential for remote code execution by authenticated attackers.
To fix ZDI-21-253, ensure your Siemens SINEC NMS installations are updated to the latest firmware version provided by Siemens.
ZDI-21-253 is caused by a flaw in the FirmwareFileUtils class that lacks proper validation of user input.
Organizations using Siemens SINEC NMS are affected by ZDI-21-253, specifically installations that require authentication.
No, ZDI-21-253 cannot be exploited without authentication, as it requires valid user credentials.