A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected devices do not properly validate the authentication when performing certain actions in the web interface allowing an unauthenticated attacker to access and edit VxLAN configuration information of networks for which they have no privileges.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Sep 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Siemens
Siemens sinema Remote Connect Server |
|
CPEs | cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:-:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:hf1:*:*:*:*:*:* |
|
Vendors & Products |
Siemens
Siemens sinema Remote Connect Server |
MITRE
Status: PUBLISHED
Assigner: siemens
Published: 2024-07-09T12:05:23.810Z
Updated: 2024-08-02T04:33:10.311Z
Reserved: 2024-07-01T13:05:40.287Z
Link: CVE-2024-39868
Vulnrichment
Updated: 2024-08-02T04:33:10.311Z
NVD
Status : Modified
Published: 2024-07-09T12:15:18.157
Modified: 2024-11-21T09:28:27.563
Link: CVE-2024-39868
Redhat
No data.