A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 HF1). Affected applications are vulnerable to command injection due to missing server side input sanitation when loading VxLAN configurations. This could allow an authenticated attacker to execute arbitrary code with root privileges.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Sep 2024 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:-:*:*:*:*:*:* |

Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-08-02T04:26:15.965Z
Reserved: 2024-06-25T15:55:17.885Z
Link: CVE-2024-39570

Updated: 2024-07-09T14:51:17.453Z

Status : Modified
Published: 2024-07-09T12:15:16.723
Modified: 2024-11-21T09:28:02.240
Link: CVE-2024-39570

No data.