CVE-2023-48431

A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). Affected software does not correctly validate the response received by an UMC server. An attacker can use this to crash the affected software by providing and configuring a malicious UMC server or by manipulating the traffic from a legitimate UMC server (i.e. leveraging CVE-2023-48427).
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_1:*:*:*:*:*:*

History

14 Dec 2023, 19:37

Type Values Removed Values Added
CPE cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 6.8
v2 : unknown
v3 : 8.6
References () https://cert-portal.siemens.com/productcert/pdf/ssa-077170.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-077170.pdf - Patch, Vendor Advisory

12 Dec 2023, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-12 12:15

Updated : 2024-02-05 00:22


NVD link : CVE-2023-48431

Mitre link : CVE-2023-48431

CVE.ORG link : CVE-2023-48431


JSON object : View

Products Affected

siemens

  • sinec_ins
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions