{ "id": "CVE-2024-31978", "sourceIdentifier": "productcert@siemens.com", "published": "2024-04-09T09:15:26.387", "lastModified": "2024-11-21T09:14:16.043", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SINEC NMS (All versions < V2.0 SP2). Affected devices allow authenticated users to export monitoring data. The corresponding API endpoint is susceptible to path traversal and could allow an authenticated attacker to download files from the file system. Under certain circumstances the downloaded files are deleted from the file system." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SINEC NMS (todas las versiones < V2.0 SP2). Los dispositivos afectados permiten a los usuarios autenticados exportar datos de monitoreo. El endpoint de la API correspondiente es susceptible a path traversal y podr\u00eda permitir que un atacante autenticado descargue archivos del sistema de archivos. En determinadas circunstancias, los archivos descargados se eliminan del sistema de archivos." } ], "metrics": { "cvssMetricV31": [ { "source": "productcert@siemens.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "baseScore": 7.6, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 4.7 } ] }, "weaknesses": [ { "source": "productcert@siemens.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-128433.html", "source": "productcert@siemens.com" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-128433.html", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }