Multiple vulnerability in Siemens SINEC Traffic Analyzer



Risk Medium
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2024-41903
CVE-2024-41904
CVE-2024-41905
CVE-2024-41906
CVE-2024-41907
CWE-ID CWE-269
CWE-307
CWE-284
CWE-524
CWE-358
Exploitation vector Network
Public exploit N/A
Vulnerable software
SINEC Traffic Analyzer
Hardware solutions / Firmware

Vendor Siemens

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Improper privilege management

EUVDB-ID: #VU95996

Risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-41903

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges.

The vulnerability exists due to improper privilege management. A remote administrator can alter the container's filesystem and escalate privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SINEC Traffic Analyzer: before 2.0

CPE2.3 External links

http://cert-portal.siemens.com/productcert/html/ssa-716317.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Restriction of Excessive Authentication Attempts

EUVDB-ID: #VU95997

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-41904

CWE-ID: CWE-307 - Improper Restriction of Excessive Authentication Attempts

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to improper restriction of excessive authentication attempts. A remote attacker can conduct brute force attacks against legitimate user passwords.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SINEC Traffic Analyzer: before 2.0

CPE2.3 External links

http://cert-portal.siemens.com/productcert/html/ssa-716317.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper access control

EUVDB-ID: #VU95998

Risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-41905

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and gain unauthorized access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SINEC Traffic Analyzer: before 2.0

CPE2.3 External links

http://cert-portal.siemens.com/productcert/html/ssa-716317.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use of cache containing sensitive information

EUVDB-ID: #VU95999

Risk: Medium

CVSSv3.1: 4.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-41906

CWE-ID: CWE-524 - Use of Cache Containing Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected application does not properly handle cacheable HTTP responses in the web service. A remote attacker can read and modify data stored in the local cache.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SINEC Traffic Analyzer: before 2.0

CPE2.3 External links

http://cert-portal.siemens.com/productcert/html/ssa-716317.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improperly implemented security check for standard

EUVDB-ID: #VU96000

Risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-41907

CWE-ID: CWE-358 - Improperly Implemented Security Check for Standard

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the the affected application is missing general HTTP security headers in the web server. A remote attacker can make the servers more prone to clickjacking.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SINEC Traffic Analyzer: before 2.0

CPE2.3 External links

http://cert-portal.siemens.com/productcert/html/ssa-716317.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###