First published: Tue Mar 10 2020(Updated: )
A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0). The DOWNLOADS section in the web interface of the Control Center Server (CCS) contains a path traversal vulnerability that could allow an authenticated remote attacker to access and download arbitrary files from the server where CCS is installed.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinvr 3 Central Control Server | ||
Siemens Sinvr 3 Video Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19290 has a medium severity rating due to its potential for unauthorized file access.
To mitigate CVE-2019-19290, upgrade to Control Center Server or Video Server versions 1.5.0 or later.
Users of Siemens Sinvr 3 Central Control Server and Video Server versions prior to 1.5.0 are affected by CVE-2019-19290.
CVE-2019-19290 can facilitate path traversal attacks, allowing an authenticated attacker to access arbitrary files.
Yes, exploitation of CVE-2019-19290 requires the attacker to be authenticated.