First published: Fri Sep 13 2019(Updated: )
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). Some pages that should only be accessible by a privileged user can also be accessed by a non-privileged user. The security vulnerability could be exploited by an attacker with network access and valid credentials for the web interface. No user interaction is required. The vulnerability could allow an attacker to access information that he should not be able to read. The affected information does not include passwords. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEMA Remote Connect Server | <=2.0 | |
Siemens SINEMA Remote Connect Server | =2.0-hf1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-13919.
The severity of CVE-2019-13919 is medium with a severity value of 4.3.
CVE-2019-13919 affects Siemens SINEMA Remote Connect Server versions prior to 2.0 SP1 and 2.0-hf1.
An attacker with network access and valid credentials can exploit CVE-2019-13919 by accessing pages that should only be accessible by a privileged user.
Yes, Siemens has released a security advisory with mitigation measures for CVE-2019-13919. Please refer to the provided reference for more information.