A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading proxy configurations. This could allow an authenticated local attacker to execute arbitrary code with system privileges.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-38092 | A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading proxy configurations. This could allow an authenticated local attacker to execute arbitrary code with system privileges. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 06 Sep 2024 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_client:3.2:-:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-08-27T20:42:55.210Z
Reserved: 2024-06-25T15:55:17.885Z
Link: CVE-2024-39568
Updated: 2024-08-02T04:26:15.966Z
Status : Modified
Published: 2024-07-09T12:15:16.263
Modified: 2024-11-21T09:28:01.897
Link: CVE-2024-39568
No data.
OpenCVE Enrichment
No data.
EUVD