A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). An attacker with administrative privileges can obtain the hash of a connected device's password. The security vulnerability could be exploited by an attacker with network access to the SINEMA Remote Connect Server and administrative privileges. At the time of advisory publication no public exploitation of this security vulnerability was known.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf - Patch, Vendor Advisory |
Information
Published : 2019-09-13 17:15
Updated : 2024-11-21 04:25
NVD link : CVE-2019-13922
Mitre link : CVE-2019-13922
CVE.ORG link : CVE-2019-13922
JSON object : View
Products Affected
siemens
- sinema_remote_connect_server
CWE
CWE-311
Missing Encryption of Sensitive Data