First published: Tue Mar 10 2020(Updated: )
A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0). The Control Center Server (CCS) contains an SQL injection vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. An authenticated remote attacker could exploit this vulnerability to read or modify the CCS database and potentially execute administrative database operations or operating system commands.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Sinvr 3 Central Control Server | ||
Siemens Sinvr 3 Video Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19292 is classified as a medium severity vulnerability due to its potential for SQL injection exploitation.
To remediate CVE-2019-19292, upgrade Control Center Server (CCS) to version 1.5.0 or later.
CVE-2019-19292 affects all versions of Siemens Sinvr 3 Central Control Server and Sinvr 3 Video Server prior to version 1.5.0.
Yes, CVE-2019-19292 can be exploited by an authenticated remote attacker via the application's XML-based communication protocol.
CVE-2019-19292 is an SQL injection vulnerability that allows attackers to manipulate database queries through improper input validation.