First published: Thu Dec 12 2019(Updated: )
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with valid authentication at the RMI interface could be able to gain remote code execution through an unsecured file upload. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sppa-t3000 Application Server | <r8.2 | |
Siemens Sppa-t3000 Application Server | =r8.2 | |
Siemens Sppa-t3000 Application Server | =r8.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18288 is a vulnerability found in SPPA-T3000 Application Server that allows an attacker with valid authentication to gain remote code execution through an unsecured file upload.
The severity of CVE-2019-18288 is high, with a severity value of 8.8.
All versions prior to Service Pack R8.2 SP2 of SPPA-T3000 Application Server are affected.
An attacker can exploit CVE-2019-18288 by gaining valid authentication at the RMI interface and then performing an unsecured file upload to achieve remote code execution.
More information about CVE-2019-18288 can be found in the Siemens Security Advisory and the CERT-Portal advisory.