First published: Thu Dec 12 2019(Updated: )
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). The RMI communication between the client and the Application Server is unencrypted. An attacker with access to the communication channel can read credentials of a valid user. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sppa-t3000 Application Server | <r8.2 | |
Siemens Sppa-t3000 Application Server | =r8.2 | |
Siemens Sppa-t3000 Application Server | =r8.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18285 refers to a vulnerability that has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2).
The severity of CVE-2019-18285 is medium with a score of 5.9.
The Siemens Sppa-t3000 Application Server versions up to and excluding R8.2 SP2 are affected by CVE-2019-18285.
CVE-2019-18285 allows an attacker with access to the communication channel to read credentials of a valid user in the unencrypted RMI communication between the client and the Application Server.
To fix CVE-2019-18285, it is recommended to update the Siemens Sppa-t3000 Application Server to Service Pack R8.2 SP2 or later, which encrypts the RMI communication between the client and the Application Server.