First published: Thu Dec 12 2019(Updated: )
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could gain remote code execution by sending specifically crafted packets to 1099/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sppa-t3000 Application Server | <r8.2 | |
Siemens Sppa-t3000 Application Server | =r8.2 | |
Siemens Sppa-t3000 Application Server | =r8.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18316 is a vulnerability in the SPPA-T3000 Application Server that allows remote code execution.
CVE-2019-18316 has a severity rating of 9.8, which is classified as critical.
CVE-2019-18316 works by allowing an attacker with network access to the Application Server to send specially crafted packets to gain remote code execution.
All versions of SPPA-T3000 Application Server below Service Pack R8.2 SP2 are affected by CVE-2019-18316.
To fix CVE-2019-18316, it is recommended to update the SPPA-T3000 Application Server to Service Pack R8.2 SP2 or a later version.