Local Auth Priv Escalation via User Management in SINEMA RCS <V3.2 SP1
CVE-2024-39870 Published on July 9, 2024

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected applications can be configured to allow users to manage own users. A local authenticated user with this privilege could use this modify users outside of their own scope as well as to escalate privileges.

NVD

Weakness Type

Client-Side Enforcement of Server-Side Security

The software is composed of a server that relies on the client to implement a mechanism that is intended to protect the server. When the server relies on protection mechanisms placed on the client side, an attacker can modify the client-side behavior to bypass the protection mechanisms resulting in potentially unexpected interactions between the client and server. The consequences will vary, depending on what the mechanisms are trying to protect.


Products Associated with CVE-2024-39870

Want to know whenever a new CVE is published for Siemens Sinema Remote Connect Server? stack.watch will email you.

 

Affected Versions

Siemens SINEMA Remote Connect Server:

Exploit Probability

EPSS
0.24%
Percentile
46.79%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.