A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application does not properly assign rights to temporary files created during its update process. This could allow an authenticated attacker with the 'Manage firmware updates' role to escalate their privileges on the underlying OS level.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Sep 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Siemens
Siemens sinema Remote Connect Server |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:-:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:hf1:*:*:*:*:*:* |
|
Vendors & Products |
Siemens
Siemens sinema Remote Connect Server |
MITRE
Status: PUBLISHED
Assigner: siemens
Published: 2024-07-09T12:05:28.983Z
Updated: 2024-08-02T04:33:11.019Z
Reserved: 2024-07-01T13:05:40.288Z
Link: CVE-2024-39872
Vulnrichment
Updated: 2024-08-02T04:33:11.019Z
NVD
Status : Modified
Published: 2024-07-09T12:15:19.070
Modified: 2024-11-21T09:28:28.157
Link: CVE-2024-39872
Redhat
No data.