A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0). The Control Center Server (CCS) contains a directory traversal
vulnerability in its XML-based communication protocol as provided by default
on ports 5444/tcp and 5440/tcp.
An authenticated remote attacker with network access to the CCS server
could exploit this vulnerability to list arbitrary directories
or read files outside of the CCS application context.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf - Vendor Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf - |
09 Jan 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0). The Control Center Server (CCS) contains a directory traversal vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. An authenticated remote attacker with network access to the CCS server could exploit this vulnerability to list arbitrary directories or read files outside of the CCS application context. | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 7.7 |
Information
Published : 2019-12-12 19:15
Updated : 2024-11-21 04:33
NVD link : CVE-2019-18338
Mitre link : CVE-2019-18338
CVE.ORG link : CVE-2019-18338
JSON object : View
Products Affected
siemens
- sinvr_3_central_control_server
- sinvr_3_video_server