A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application does not properly assign rights to temporary files created during its update process. This could allow an authenticated attacker with the Manage firmware updates role to escalate their privileges on the underlying OS level.
Opening temporary files without appropriate measures or controls can leave the file, its contents and any function that it impacts vulnerable to attack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sinema_remote_connect_server | Siemens | * | 3.2 (excluding) |
Sinema_remote_connect_server | Siemens | 3.2 (including) | 3.2 (including) |
Sinema_remote_connect_server | Siemens | 3.2-hf1 (including) | 3.2-hf1 (including) |