A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). Some parts of the web application are not protected against Cross Site Request Forgery (CSRF) attacks. The security vulnerability could be exploited by an attacker that is able to trigger requests of a logged-in user to the application. The vulnerability could allow switching the connectivity state of a user or a device. At the time of advisory publication no public exploitation of this security vulnerability was known.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf - Patch, Vendor Advisory |
Information
Published : 2019-09-13 17:15
Updated : 2024-11-21 04:25
NVD link : CVE-2019-13920
Mitre link : CVE-2019-13920
CVE.ORG link : CVE-2019-13920
JSON object : View
Products Affected
siemens
- sinema_remote_connect_server
CWE
CWE-352
Cross-Site Request Forgery (CSRF)