Sinema Remote Connect Server <V3.2 SP1 web UI unauthenticated config edit
CVE-2024-39867 Published on July 9, 2024

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected devices do not properly validate the authentication when performing certain actions in the web interface allowing an unauthenticated attacker to access and edit device configuration information of devices for which they have no privileges.

NVD

Weakness Type

What is a forced browsing Vulnerability?

The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files. Web applications susceptible to direct request attacks often make the false assumption that such resources can only be reached through a given navigation path and so only apply authorization at certain points in the path.

CVE-2024-39867 has been classified to as a forced browsing vulnerability or weakness.


Products Associated with CVE-2024-39867

Want to know whenever a new CVE is published for Siemens Sinema Remote Connect Server? stack.watch will email you.

 

Affected Versions

Siemens SINEMA Remote Connect Server:

Exploit Probability

EPSS
0.39%
Percentile
59.32%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.