A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). Some pages that should only be accessible by a privileged user can also be accessed by a non-privileged user. The security vulnerability could be exploited by an attacker with network access and valid credentials for the web interface. No user interaction is required. The vulnerability could allow an attacker to access information that he should not be able to read. The affected information does not include passwords. At the time of advisory publication no public exploitation of this security vulnerability was known.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf - Patch, Vendor Advisory |
Information
Published : 2019-09-13 17:15
Updated : 2024-11-21 04:25
NVD link : CVE-2019-13919
Mitre link : CVE-2019-13919
CVE.ORG link : CVE-2019-13919
JSON object : View
Products Affected
siemens
- sinema_remote_connect_server
CWE