- Description
- A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly validate input sent to specific endpoints of its web API. This could allow an authenticated remote attacker with high privileges on the application to execute arbitrary code on the underlying OS.
- Source
- productcert@siemens.com
- NVD status
- Analyzed
CVSS 4.0
- Type
- Secondary
- Base score
- 9.4
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 6
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- productcert@siemens.com
- CWE-78
- Hype score
- Not currently trending
CVE-2024-46890 (CVSS:9.1, CRITICAL) is Analyzed. A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not p..https://t.co/twLzqxZEiv #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
17 Nov 2024
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-46890: CRITICAL] Urgent: Critical vulnerability in SINEC INS (Versions < V1.0 SP2 Update 3) allows remote attackers to execute arbitrary code. Ensure updates are applied immediately! #cybersecurity#cybersecurity,#vulnerability https://t.co/kTRkZIyTHw https://t.co/dNp
@CveFindCom
12 Nov 2024
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-46890 A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly validate input sent to specific endpoi… https://t.co/L4nv7CxEUf
@CVEnew
12 Nov 2024
247 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C89891C1-DFD7-4E1F-80A9-7485D86A15B5",
"versionEndExcluding": "1.0"
},
{
"criteria": "cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4664B195-AF14-4834-82B3-0B2C98020EB6"
},
{
"criteria": "cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "75BC588E-CDF0-404E-AD61-02093A1DF343"
},
{
"criteria": "cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A334F7B4-7283-4453-BAED-D2E01B7F8A6E"
},
{
"criteria": "cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A6BEA71C-CA81-4B5D-A688-2B21E62DC351"
},
{
"criteria": "cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6B405F22-5517-49F5-A7CA-1E50D58DFC75"
}
],
"operator": "OR"
}
]
}
]