A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application uses hard-coded cryptographic key material to obfuscate configuration files. This could allow an attacker to learn that cryptographic key material through reverse engineering of the application binary and decrypt arbitrary backup files.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Nov 2024 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Siemens
Siemens sinec Ins |
|
CPEs | cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_1:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_2:*:*:*:*:*:* |
|
Vendors & Products |
Siemens
Siemens sinec Ins |
Tue, 12 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Seimens
Seimens sinec Ins |
|
CPEs | cpe:2.3:a:seimens:sinec_ins:*:*:*:*:*:*:*:* | |
Vendors & Products |
Seimens
Seimens sinec Ins |
|
Metrics |
ssvc
|
Tue, 12 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application uses hard-coded cryptographic key material to obfuscate configuration files. This could allow an attacker to learn that cryptographic key material through reverse engineering of the application binary and decrypt arbitrary backup files. | |
Weaknesses | CWE-321 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: siemens
Published: 2024-11-12T12:49:40.474Z
Updated: 2024-11-12T14:30:25.375Z
Reserved: 2024-09-12T11:24:19.243Z
Link: CVE-2024-46889
Vulnrichment
Updated: 2024-11-12T14:30:19.397Z
NVD
Status : Analyzed
Published: 2024-11-12T13:15:09.200
Modified: 2024-11-13T23:11:58.763
Link: CVE-2024-46889
Redhat
No data.