SINEC Traffic Analyzer <1.2: Improper HTTP Method Exposure Enables File Mod
CVE-2024-35209 Published on June 11, 2024

A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server is allowing HTTP methods like PUT and Delete. This could allow an attacker to modify unauthorized files.

NVD

Weakness Type

Exposed Dangerous Method or Function

The software provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted.


Products Associated with CVE-2024-35209

Want to know whenever a new CVE is published for Siemens Sinec Traffic Analyzer? stack.watch will email you.

 

Affected Versions

Siemens SINEC Traffic Analyzer: siemens traffic_analyzer:

Exploit Probability

EPSS
0.39%
Percentile
59.43%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.