First published: Thu Dec 12 2019(Updated: )
A vulnerability has been identified in SiNVR/SiVMS Video Server (All versions < V5.0.0). The HTTP service (default port 5401/tcp) of the SiVMS/SiNVR Video Server contains an authentication bypass vulnerability, even when properly configured with enforced authentication. A remote attacker with network access to the Video Server could exploit this vulnerability to read the SiVMS/SiNVR users database, including the passwords of all users in obfuscated cleartext.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinvr 3 Central Control Server | ||
Siemens Sinvr 3 Video Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18339 is considered a critical vulnerability due to the potential for unauthorized access to sensitive video server functionalities.
To mitigate CVE-2019-18339, upgrade to SiNVR/SiVMS Video Server version 5.0.0 or later, which addresses the authentication bypass issue.
CVE-2019-18339 affects all versions of SiNVR/SiVMS Video Server prior to version 5.0.0, including SiNVR 3 Central Control Server and SiNVR 3 Video Server.
Yes, CVE-2019-18339 can be exploited remotely by an attacker on the network without requiring physical access.
Currently, there are no effective workarounds for CVE-2019-18339, so upgrading is the recommended course of action.