First published: Thu Dec 12 2019(Updated: )
A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0). The Control Center Server (CCS) contains a directory traversal vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. An authenticated remote attacker with network access to the CCS server could exploit this vulnerability to list arbitrary directories or read files outside of the CCS application context.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinvr 3 Central Control Server | ||
Siemens Sinvr 3 Video Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18338 is considered a high-severity vulnerability due to its potential for unauthorized access to sensitive directories.
To fix CVE-2019-18338, upgrade the Control Center Server (CCS) to version 1.5.0 or later.
CVE-2019-18338 affects Siemens Sinvr 3 Central Control Server and Sinvr 3 Video Server across all versions prior to 1.5.0.
Yes, CVE-2019-18338 can be exploited remotely by an authenticated attacker to gain access to directory structures.
CVE-2019-18338 involves a directory traversal vulnerability in the XML-based communication protocol used by Control Center Server.