First published: Mon Mar 15 2021(Updated: )
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0). The webserver could allow unauthorized actions via special urls for unpriviledged users. The settings of the UMC authorization server could be changed to add a rogue server by an attacker authenticating with unprivilege user rights.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINEMA Remote Connect Server | <3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-25239 is high with a severity value of 8.8.
All versions of SINEMA Remote Connect Server below V3.0 are affected by CVE-2020-25239.
CVE-2020-25239 allows unauthorized actions via special URLs, potentially allowing an attacker to change the settings of the UMC authorization server.
An attacker can exploit CVE-2020-25239 by authenticating with unauthorized credentials and using special URLs to perform unauthorized actions.
Siemens has released a fix for CVE-2020-25239. It is recommended to update to a version higher than V3.0.