A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly restrict the size of generated log files. This could allow an unauthenticated remote attacker to trigger a large amount of logged events to exhaust the system's resources and create a denial of service condition.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Seimens
Seimens sinec Ins |
|
Weaknesses | CWE-125 | |
CPEs | cpe:2.3:a:seimens:sinec_ins:*:*:*:*:*:*:*:* | |
Vendors & Products |
Seimens
Seimens sinec Ins |
|
Metrics |
ssvc
|
Tue, 12 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly restrict the size of generated log files. This could allow an unauthenticated remote attacker to trigger a large amount of logged events to exhaust the system's resources and create a denial of service condition. | |
Weaknesses | CWE-400 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-11-12T14:25:48.481Z
Reserved: 2024-09-12T11:24:19.243Z
Link: CVE-2024-46891

Updated: 2024-11-12T14:25:40.779Z

Status : Awaiting Analysis
Published: 2024-11-12T13:15:09.693
Modified: 2024-11-12T15:35:11.240
Link: CVE-2024-46891

No data.