First published: Thu Dec 12 2019(Updated: )
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). The AdminService is available without authentication on the Application Server. An attacker can use methods exposed via this interface to receive password hashes of other users and to change user passwords. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sppa-t3000 Application Server | <r8.2 | |
Siemens Sppa-t3000 Application Server | =r8.2 | |
Siemens Sppa-t3000 Application Server | =r8.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-18284.
The severity of CVE-2019-18284 is critical with a severity value of 9.8.
All versions before Service Pack R8.2 SP2 of Siemens SPPA-T3000 Application Server are affected by CVE-2019-18284.
CVE-2019-18284 allows an attacker to receive password hashes of other users and change settings without authentication on the Application Server.
Yes, you can find more information about CVE-2019-18284 at the following links: [Siemens Security Advisory](http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html) and [Siemens Product CERT](https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf).