Lucene search

K
nessusThis script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.SCADA_SIEMENS_SINEMARC_SSA-884497.NBIN
HistoryDec 02, 2019 - 12:00 a.m.

Siemens SINEMA Remote Connect Server Multiple Vulnerabilities (SSA-884497)

2019-12-0200:00:00
This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
21

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

54.2%

The Siemens SINEMA Remote Connect Server running on the remote host is affected by multiple vulnerabilities:

  • The web interface has no means to prevent password guessing attacks. This vulnerability could be exploited by an attacker with network access to the vulnerable software, requiring no privileges and no user interaction. Exploitation could allow full access to the web interface. (CVE-2019-13918)

  • Some pages that should only be accessible by a privileged user can also be accessed by a non-privileged user. This vulnerability could be exploited by an attacker with network access and valid credentials for the web interface. No user interaction is required. Exploitation could allow an attacker to access information they should not be able to read. The information affected by this vulnerability does not include passwords.
    (CVE-2019-13919)

  • Some parts of the web application are not protected against cross-site request forgery (CSRF) attacks. This vulnerability could be exploited by an attacker who is able to trigger requests of a logged-in user to the application. Exploitation could allow switching the connectivity state of a user or a device.
    (CVE-2019-13920)

  • An attacker with administrative privileges can obtain the hash of a connected device’s password. The security vulnerability could be exploited by an attacker with network access to the SINEMA Remote Connect Server and administrative privileges. (CVE-2019-13922)

Binary data scada_siemens_sinemarc_ssa-884497.nbin
VendorProductVersionCPE
siemenssinema_remote_connect_serverx-cpe:/a:siemens:sinema_remote_connect_server

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

54.2%

Related for SCADA_SIEMENS_SINEMARC_SSA-884497.NBIN