A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 SP2). The affected application does not expire the user session on reboot without logout. This could allow an attacker to bypass Multi-Factor Authentication.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-417159.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Aug 2025, 19:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/html/ssa-417159.html - Vendor Advisory | |
CPE | cpe:2.3:a:siemens:sinema_remote_connect_client:3.2:-:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_client:3.2:sp1:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:* |
|
First Time |
Siemens sinema Remote Connect Client
Siemens |
10 Sep 2024, 12:09
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-10 10:15
Updated : 2025-08-20 19:24
NVD link : CVE-2024-32006
Mitre link : CVE-2024-32006
CVE.ORG link : CVE-2024-32006
JSON object : View
Products Affected
siemens
- sinema_remote_connect_client
CWE
CWE-613
Insufficient Session Expiration