Impact
The flaw permits a low‑privileged user to modify the Siemens SINEC NMS configuration file, enabling the injection of malicious DLLs. When the application loads these libraries, it can execute arbitrary code with administrative rights, effectively allowing full system compromise. This weakness corresponds to the directory traversal/path manipulation mechanisms identified as CWE‑427.
Affected Systems
Siemens SINEC NMS versions older than 4.0 Service Pack 2 are affected. The vulnerability is present in all releases prior to that, including the 4.0.0 baseline and its sp1 revision. Only the Siemens SINEC NMS product is impacted.
Risk and Exploitability
The CVSS score of 8.5 reflects a high impact and ease of exploitation, yet the EPSS rating of less than 1% suggests it is unlikely to be attacked in the wild at present. The vulnerability is not listed in the CISA KEV catalog. Attackers would need local access with low privileges, then modify a configuration file to point to a malicious DLL, after which the service runs the code with elevated privileges.
OpenCVE Enrichment