A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an authenticated local attacker to execute arbitrary code with system privileges.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-38091 | A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an authenticated local attacker to execute arbitrary code with system privileges. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 21 Aug 2025 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:siemens:sinema_remote_connect_client:3.2:-:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-08-27T20:42:55.068Z
Reserved: 2024-06-25T15:55:17.885Z
Link: CVE-2024-39567
Updated: 2024-08-02T04:26:16.003Z
Status : Analyzed
Published: 2024-07-09T12:15:16.053
Modified: 2025-08-21T00:54:46.060
Link: CVE-2024-39567
No data.
OpenCVE Enrichment
No data.
EUVD