First published: Thu Dec 12 2019(Updated: )
A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could be able to gain access to logs and configuration files by sending specifically crafted packets to 80/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sppa-t3000 Application Server | <r8.2 | |
Siemens Sppa-t3000 Application Server | =r8.2 | |
Siemens Sppa-t3000 Application Server | =r8.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-18335.
The affected software is Siemens Sppa-t3000 Application Server version up to and excluding R8.2 SP2.
The severity of CVE-2019-18335 is medium, with a severity value of 5.3.
An attacker with network access to the Application Server can exploit CVE-2019-18335 by sending specifically crafted packets to 80/tcp, which allows them to gain access to logs and configuration files.
You can find more information about CVE-2019-18335 in the security advisory provided by Siemens: [link](https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf)