We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-30208



Description

A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA30) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA30) (All versions < V3.0.1.1). The "DBTest" tool of SIMATIC RTLS Locating Manager does not properly enforce access restriction. This could allow an authenticated local attacker to extract sensitive information from memory.

Reserved 2024-03-25 | Published 2024-05-14 | Updated 2024-08-02 | Assigner siemens


MEDIUM: 6.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 5.2CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H

Problem types

CWE-732: Incorrect Permission Assignment for Critical Resource

Product status

Default status
unknown

Any version before V3.0.1.1
affected

Default status
unknown

Any version before V3.0.1.1
affected

Default status
unknown

Any version before V3.0.1.1
affected

Default status
unknown

Any version before V3.0.1.1
affected

Default status
unknown

Any version before V3.0.1.1
affected

Default status
unknown

Any version before V3.0.1.1
affected

Default status
unknown

Any version before V3.0.1.1
affected

References

cert-portal.siemens.com/productcert/html/ssa-093430.html

cve.org (CVE-2024-30208)

nvd.nist.gov (CVE-2024-30208)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-30208

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.