A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly sanitize user provided paths for SFTP-based file up- and downloads. This could allow an authenticated remote attacker to manipulate arbitrary files on the filesystem and achieve arbitrary code execution on the device.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Nov 2024 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Siemens
Siemens sinec Ins |
|
CPEs | cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_1:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_2:*:*:*:*:*:* |
|
Vendors & Products |
Siemens
Siemens sinec Ins |
Tue, 12 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Seimens
Seimens sinec Ins |
|
CPEs | cpe:2.3:a:seimens:sinec_ins:*:*:*:*:*:*:*:* | |
Vendors & Products |
Seimens
Seimens sinec Ins |
|
Metrics |
ssvc
|
Tue, 12 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly sanitize user provided paths for SFTP-based file up- and downloads. This could allow an authenticated remote attacker to manipulate arbitrary files on the filesystem and achieve arbitrary code execution on the device. | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: siemens
Published: 2024-11-12T12:49:39.127Z
Updated: 2024-11-12T14:32:11.296Z
Reserved: 2024-09-12T11:24:19.243Z
Link: CVE-2024-46888
Vulnrichment
Updated: 2024-11-12T14:32:03.628Z
NVD
Status : Analyzed
Published: 2024-11-12T13:15:08.927
Modified: 2024-11-13T23:11:24.570
Link: CVE-2024-46888
Redhat
No data.