Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-38278 | A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application does not properly implement brute force protection against user credentials in its web API. This could allow an attacker to learn user credentials that are vulnerable to brute force attacks. |
Fri, 02 May 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:siemens:sinema_remote_connect_server:-:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Mon, 09 Sep 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Siemens
Siemens sinema Remote Connect Server |
|
| CPEs | cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:-:*:*:*:*:*:* cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:hf1:*:*:*:*:*:* |
|
| Vendors & Products |
Siemens
Siemens sinema Remote Connect Server |
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-08-27T20:42:57.342Z
Reserved: 2024-07-01T13:05:40.288Z
Link: CVE-2024-39873
Updated: 2024-08-02T04:33:10.241Z
Status : Modified
Published: 2024-07-09T12:15:19.317
Modified: 2024-11-21T09:28:28.303
Link: CVE-2024-39873
No data.
OpenCVE Enrichment
No data.
EUVD