ID

VAR-202411-0479


CVE

CVE-2024-46891


TITLE

Siemens'  SINEC INS  Resource exhaustion vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2024-027250

DESCRIPTION

A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly restrict the size of generated log files. This could allow an unauthenticated remote attacker to trigger a large amount of logged events to exhaust the system's resources and create a denial of service condition. Siemens' SINEC INS contains resource exhaustion vulnerabilities and out-of-bounds read vulnerabilities.Service operation interruption (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2024-46891 // JVNDB: JVNDB-2024-027250

AFFECTED PRODUCTS

vendor:siemensmodel:sinec insscope:lteversion:1.0

Trust: 1.0

vendor:siemensmodel:sinec insscope:eqversion:1.0

Trust: 1.0

vendor:シーメンスmodel:sinec insscope:eqversion:1.0

Trust: 0.8

vendor:シーメンスmodel:sinec insscope:lteversion:1.0 and earlier

Trust: 0.8

vendor:シーメンスmodel:sinec insscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:sinec insscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2024-027250 // NVD: CVE-2024-46891

CVSS

SEVERITY

CVSSV2

CVSSV3

productcert@siemens.com: CVE-2024-46891
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2024-46891
value: HIGH

Trust: 1.0

NVD: CVE-2024-46891
value: HIGH

Trust: 0.8

productcert@siemens.com: CVE-2024-46891
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2024-46891
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2024-46891
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2024-027250 // NVD: CVE-2024-46891 // NVD: CVE-2024-46891

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.0

problemtype:CWE-125

Trust: 1.0

problemtype:Out-of-bounds read (CWE-125) [ others ]

Trust: 0.8

problemtype: Resource exhaustion (CWE-400) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-027250 // NVD: CVE-2024-46891

EXTERNAL IDS

db:NVDid:CVE-2024-46891

Trust: 2.6

db:SIEMENSid:SSA-915275

Trust: 1.8

db:JVNid:JVNVU96191615

Trust: 0.8

db:ICS CERTid:ICSA-24-319-08

Trust: 0.8

db:JVNDBid:JVNDB-2024-027250

Trust: 0.8

sources: JVNDB: JVNDB-2024-027250 // NVD: CVE-2024-46891

REFERENCES

url:https://cert-portal.siemens.com/productcert/html/ssa-915275.html

Trust: 1.8

url:https://jvn.jp/vu/jvnvu96191615/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-46891

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-08

Trust: 0.8

sources: JVNDB: JVNDB-2024-027250 // NVD: CVE-2024-46891

SOURCES

db:JVNDBid:JVNDB-2024-027250
db:NVDid:CVE-2024-46891

LAST UPDATE DATE

2025-08-23T21:53:24.863000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2024-027250date:2025-08-21T06:58:00
db:NVDid:CVE-2024-46891date:2025-08-20T19:11:08.183

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2024-027250date:2025-08-21T00:00:00
db:NVDid:CVE-2024-46891date:2024-11-12T13:15:09.693