A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly validate input sent to specific endpoints of its web API. This could allow an authenticated remote attacker with high privileges on the application to execute arbitrary code on the underlying OS.
History

Wed, 13 Nov 2024 23:30:00 +0000

Type Values Removed Values Added
First Time appeared Siemens
Siemens sinec Ins
CPEs cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_1:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_2:*:*:*:*:*:*
Vendors & Products Siemens
Siemens sinec Ins

Tue, 12 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Seimens
Seimens sinec Ins
CPEs cpe:2.3:a:seimens:sinec_ins:*:*:*:*:*:*:*:*
Vendors & Products Seimens
Seimens sinec Ins
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 Nov 2024 13:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly validate input sent to specific endpoints of its web API. This could allow an authenticated remote attacker with high privileges on the application to execute arbitrary code on the underlying OS.
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published: 2024-11-12T12:49:41.829Z

Updated: 2024-11-12T14:28:21.227Z

Reserved: 2024-09-12T11:24:19.243Z

Link: CVE-2024-46890

cve-icon Vulnrichment

Updated: 2024-11-12T14:28:12.436Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-12T13:15:09.463

Modified: 2024-11-13T23:12:39.993

Link: CVE-2024-46890

cve-icon Redhat

No data.