A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). The web interface has no means to prevent password guessing attacks. The vulnerability could be exploited by an attacker with network access to the vulnerable software, requiring no privileges and no user interaction. The vulnerability could allow full access to the web interface. At the time of advisory publication no public exploitation of this security vulnerability was known.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf - Patch, Vendor Advisory |
Information
Published : 2019-09-13 17:15
Updated : 2024-11-21 04:25
NVD link : CVE-2019-13918
Mitre link : CVE-2019-13918
CVE.ORG link : CVE-2019-13918
JSON object : View
Products Affected
siemens
- sinema_remote_connect_server