A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly validate input sent to specific endpoints of its web API. This could allow an authenticated remote attacker with high privileges on the application to execute arbitrary code on the underlying OS.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Nov 2024 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Siemens
Siemens sinec Ins |
|
CPEs | cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_1:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_2:*:*:*:*:*:* |
|
Vendors & Products |
Siemens
Siemens sinec Ins |
Tue, 12 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Seimens
Seimens sinec Ins |
|
CPEs | cpe:2.3:a:seimens:sinec_ins:*:*:*:*:*:*:*:* | |
Vendors & Products |
Seimens
Seimens sinec Ins |
|
Metrics |
ssvc
|
Tue, 12 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly validate input sent to specific endpoints of its web API. This could allow an authenticated remote attacker with high privileges on the application to execute arbitrary code on the underlying OS. | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: siemens
Published: 2024-11-12T12:49:41.829Z
Updated: 2024-11-12T14:28:21.227Z
Reserved: 2024-09-12T11:24:19.243Z
Link: CVE-2024-46890
Vulnrichment
Updated: 2024-11-12T14:28:12.436Z
NVD
Status : Analyzed
Published: 2024-11-12T13:15:09.463
Modified: 2024-11-13T23:12:39.993
Link: CVE-2024-46890
Redhat
No data.