First published: Thu Dec 12 2019(Updated: )
A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0). The SFTP service (default port 22/tcp) of the Control Center Server (CCS) contains an authentication bypass vulnerability. A remote attacker with network access to the CCS server could exploit this vulnerability to read data from the EDIR directory (for example, the list of all configured stations).
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinvr 3 Central Control Server | ||
Siemens Sinvr 3 Video Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18341 is rated as a critical vulnerability due to its authentication bypass nature, allowing remote attackers to gain unauthorized access.
To address CVE-2019-18341, upgrade the Control Center Server (CCS) to version 1.5.0 or later.
CVE-2019-18341 affects all versions of the Control Center Server (CCS) prior to V1.5.0, specifically Siemens Sinvr 3 Central Control Server and Video Server.
Yes, CVE-2019-18341 can be exploited by remote attackers who have network access to the affected CCS server.
The exploitation of CVE-2019-18341 can lead to unauthorized access to sensitive system information and controls within the CCS.