cvelist/2024/46xxx/CVE-2024-46892.json

75 lines
2.5 KiB
JSON
Raw Normal View History

2024-09-12 12:00:35 +00:00
{
2024-11-12 13:00:32 +00:00
"data_version": "4.0",
2024-09-12 12:00:35 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-46892",
2024-11-12 13:00:32 +00:00
"ASSIGNER": "productcert@siemens.com",
"STATE": "PUBLIC"
2024-09-12 12:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-11-12 13:00:32 +00:00
"value": "A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly invalidate sessions when the associated user is deleted or disabled or their permissions are modified. This could allow an authenticated attacker to continue performing malicious actions even after their user account has been disabled."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-613: Insufficient Session Expiration",
"cweId": "CWE-613"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "SINEC INS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V1.0 SP2 Update 3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-915275.html",
"refsource": "MISC",
"name": "https://cert-portal.siemens.com/productcert/html/ssa-915275.html"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
2024-09-12 12:00:35 +00:00
}
]
}
}