First published: Thu Dec 12 2019(Updated: )
A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0). The Control Center Server (CCS) contains an authentication bypass vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. A remote attacker with network access to the CCS server could exploit this vulnerability to read the CCS users database, including the passwords of all users in obfuscated cleartext.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinvr 3 Central Control Server | ||
Siemens Sinvr 3 Video Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18337 is considered a critical vulnerability due to the potential for an authentication bypass.
To mitigate CVE-2019-18337, upgrade to Control Center Server (CCS) version 1.5.0 or newer.
CVE-2019-18337 exploits an authentication bypass in the XML-based communication protocol used by Control Center Server.
CVE-2019-18337 affects all versions of Siemens Sinvr 3 Central Control Server and Video Server prior to version 1.5.0.
You can determine vulnerability to CVE-2019-18337 by checking if you are running a version of Control Center Server prior to 1.5.0.