CVE-2024-39567
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an authenticated local attacker to execute arbitrary code with system privileges.
Se ha identificado una vulnerabilidad en SINEMA Remote Connect Client (todas las versiones < V3.2 HF1). El servicio del sistema de las aplicaciones afectadas es vulnerable a la inyección de comandos debido a la falta de sanitización de entrada del lado del servidor al cargar las configuraciones de VPN. Esto podría permitir que un atacante local autenticado ejecute código arbitrario con privilegios del sistema.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-06-25 CVE Reserved
- 2024-07-09 CVE Published
- 2024-07-10 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
References (1)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Sinema Remote Connect Client Search vendor "Siemens" for product "Sinema Remote Connect Client" | * | - |
Affected
|