SINEC Traffic Analyzer <1.2: Improper HTTP Method Exposure Enables File Mod
CVE-2024-35209 Published on June 11, 2024
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server is allowing HTTP methods like PUT and Delete. This could allow an attacker to modify unauthorized files.
Weakness Type
Exposed Dangerous Method or Function
The software provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted.
Products Associated with CVE-2024-35209
Want to know whenever a new CVE is published for Siemens Sinec Traffic Analyzer? stack.watch will email you.
Affected Versions
Siemens SINEC Traffic Analyzer:- Before V1.2 is affected.
- Before v1.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.