ID

VAR-202407-0136


CVE

CVE-2024-39865


TITLE

Siemens'  SINEMA Remote Connect Server  Vulnerability in unlimited upload of dangerous types of files in

Trust: 0.8

sources: JVNDB: JVNDB-2024-007646

DESCRIPTION

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application allows users to upload encrypted backup files. As part of this backup, files can be restored without correctly checking the path of the restored file. This could allow an attacker with access to the backup encryption key to upload malicious files, that could potentially lead to remote code execution. Siemens' SINEMA Remote Connect Server Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The platform is mainly used for remote access, maintenance, control and diagnosis of underlying networks

Trust: 2.16

sources: NVD: CVE-2024-39865 // JVNDB: JVNDB-2024-007646 // CNVD: CNVD-2024-31233

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-31233

AFFECTED PRODUCTS

vendor:siemensmodel:sinema remote connect serverscope:ltversion:3.2

Trust: 1.0

vendor:siemensmodel:sinema remote connect serverscope:eqversion:3.2

Trust: 1.0

vendor:シーメンスmodel:sinema remote connect serverscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinema remote connect serverscope:eqversion: -

Trust: 0.8

vendor:シーメンスmodel:sinema remote connect serverscope:eqversion:3.2

Trust: 0.8

vendor:siemensmodel:sinema remote connect server sp1scope:ltversion:v3.2

Trust: 0.6

sources: CNVD: CNVD-2024-31233 // JVNDB: JVNDB-2024-007646 // NVD: CVE-2024-39865

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2024-39865
value: HIGH

Trust: 1.0

productcert@siemens.com: CVE-2024-39865
value: HIGH

Trust: 1.0

NVD: CVE-2024-39865
value: HIGH

Trust: 0.8

CNVD: CNVD-2024-31233
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-31233
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2024-39865
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2024-39865
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-31233 // JVNDB: JVNDB-2024-007646 // NVD: CVE-2024-39865 // NVD: CVE-2024-39865

PROBLEMTYPE DATA

problemtype:CWE-434

Trust: 1.0

problemtype:Unlimited uploads of dangerous types of files (CWE-434) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-007646 // NVD: CVE-2024-39865

PATCH

title:Patch for Siemens SINEMA Remote Connect Server file upload vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/567746

Trust: 0.6

sources: CNVD: CNVD-2024-31233

EXTERNAL IDS

db:NVDid:CVE-2024-39865

Trust: 3.2

db:SIEMENSid:SSA-381581

Trust: 2.4

db:ICS CERTid:ICSA-24-193-01

Trust: 0.8

db:JVNid:JVNVU99298639

Trust: 0.8

db:JVNDBid:JVNDB-2024-007646

Trust: 0.8

db:CNVDid:CNVD-2024-31233

Trust: 0.6

sources: CNVD: CNVD-2024-31233 // JVNDB: JVNDB-2024-007646 // NVD: CVE-2024-39865

REFERENCES

url:https://cert-portal.siemens.com/productcert/html/ssa-381581.html

Trust: 2.4

url:https://jvn.jp/vu/jvnvu99298639/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-39865

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-01

Trust: 0.8

sources: CNVD: CNVD-2024-31233 // JVNDB: JVNDB-2024-007646 // NVD: CVE-2024-39865

SOURCES

db:CNVDid:CNVD-2024-31233
db:JVNDBid:JVNDB-2024-007646
db:NVDid:CVE-2024-39865

LAST UPDATE DATE

2024-09-11T19:28:36.171000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-31233date:2024-07-10T00:00:00
db:JVNDBid:JVNDB-2024-007646date:2024-09-10T00:49:00
db:NVDid:CVE-2024-39865date:2024-09-09T15:12:08.177

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-31233date:2024-07-10T00:00:00
db:JVNDBid:JVNDB-2024-007646date:2024-09-10T00:00:00
db:NVDid:CVE-2024-39865date:2024-07-09T12:15:17.443