Unauthenticated Web Auth Bypass in SINEMA Remote Connect Server <V3.2 SP1
CVE-2024-39868 Published on July 9, 2024
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). Affected devices do not properly validate the authentication when performing certain actions in the web interface allowing an unauthenticated attacker to access and edit VxLAN configuration information of networks for which they have no privileges.
Weakness Type
What is a forced browsing Vulnerability?
The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files. Web applications susceptible to direct request attacks often make the false assumption that such resources can only be reached through a given navigation path and so only apply authorization at certain points in the path.
CVE-2024-39868 has been classified to as a forced browsing vulnerability or weakness.
Products Associated with CVE-2024-39868
Want to know whenever a new CVE is published for Siemens Sinema Remote Connect Server? stack.watch will email you.
Affected Versions
Siemens SINEMA Remote Connect Server:- Before V3.2 SP1 is affected.
- Before V3.2 SP1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.