Vulnerability Description
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 HF1). Affected applications are vulnerable to command injection due to missing server side input sanitation when loading SNMP configurations. This could allow an attacker with the right to modify the SNMP configuration to execute arbitrary code with root privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Sinema Remote Connect Server | < 3.2 |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/html/ssa-928781.htmlPatchVendor Advisory
- https://cert-portal.siemens.com/productcert/html/ssa-928781.htmlPatchVendor Advisory
FAQ
What is CVE-2024-39571?
CVE-2024-39571 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 HF1). Affected applications are vulnerable to command injection due to missing server side input sanitation whe...
How severe is CVE-2024-39571?
CVE-2024-39571 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-39571?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Sinema Remote Connect Server.